GLOBAL SITUATIONMONITORING
517 published briefsUTCThu, May 14 22:39:08
Intelligence Tag

IKE Protocol Authentication Bypass

Memory corruption in IKEv2 handshake processing allows unauthenticated VPN concentration device compromise and potential lateral movement into protected enterprise networks.

1 intelligence brief← Intelligence Hub