GLOBAL SITUATIONMONITORING
517 published briefsUTCFri, Apr 24 01:16:37
Intelligence Tag

IKE Protocol Authentication Bypass

Memory corruption in IKEv2 handshake processing allows unauthenticated VPN concentration device compromise and potential lateral movement into protected enterprise networks.

1 intelligence brief← Intelligence Hub