GLOBAL SITUATIONMONITORING
482 published briefsUTCFri, Apr 3 14:32:37
Intelligence Tag

IKE Protocol Authentication Bypass

Memory corruption in IKEv2 handshake processing allows unauthenticated VPN concentration device compromise and potential lateral movement into protected enterprise networks.

1 intelligence brief← Intelligence Hub