GLOBAL SITUATIONMONITORING
517 published briefsUTCThu, May 14 23:36:48
Intelligence Tag

IKE Protocol Authentication Bypass

Memory corruption in IKEv2 handshake processing allows unauthenticated VPN concentration device compromise and potential lateral movement into protected enterprise networks.

1 intelligence brief← Intelligence Hub