Multiple Vulnerabilities in IKEv1 (US-CERT-VU#226364 NISCC-273756)

Original Release Date: February 9, 2006
Last Revised: February 9, 2006
Number: ASA-2006-043
Risk Level: High
Advisory Version: 1.0
Advisory Status: Final

1. Overview:

The US Computer Emergency Response Team (US-CERT at www.us-cert.gov), the Computer Emergency Response Team of Finland (CERT-FI at www.ficora.fi/englanti/tietoturva/cert.htm), and the National Information Security Co-Ordination Centre (NISCC at niscc.gov.uk) have issued advisories regarding multiple vulnerabilities in the Internet Key Exchange v1 (IKEv1) protocol.

Multiple vulnerabilities have been reported in IKEv1. An attacker could potentially exploit these vulnerabilities to execute arbitrary code, cause a denial-of-service condition, or cause an IKEv1 implementation to behave in an unstable/unpredictable manner. These vulnerabilities were discovered using the PROTOS Test Tool developed by Oulu University Secure Programming Group (OUSPG). Certain Avaya products utilize IKEv1, and are therefore vulnerable.

The original advisories can be viewed here:

2. Avaya System Products with IKEv1 installed:

Product Affected Versions Risk Level Actions:
Avaya VSU 100,
2000, 7500, 10000,
and CSU 5000
All versions prior to 3.2.41 High See Recommended Actions below.
Avaya SG5/5X,
200, 203, 208
None None No action is necessary.
The SG product line is not affected.

3. Recommended Actions:

Customers with vulnerable versions of the Avaya VSU product line should download the appropriate firmware for their product, as listed below. If the embedded links do not work, please follow the manual process listed below. Avaya Services MUST be contacted to get the password to unzip the file. Avaya Services can be contacted at 1-800-242-2121.

Customer should view the readme at:

Avaya VSU 100:
Download and firmware version 3.2.41 from:

Avaya VSU 2000
Download and firmware version 3.2.41 from:

Avaya CSU 5000:
Download and firmware version 3.2.41 from:

Avaya VSU 7500:
Download and firmware version 3.2.41 from:

Avaya VSU 10000:
Download and firmware version 3.2.41 from:

Manual Firmware Download in Internet Explorer:

  1. Open a browser and go to ftp.avaya.com
  2. Select "Login as" from the File Menu
  3. Enter the user name vpnet
  4. Enter the password vpn365
  5. Browse to the vpnware3.2 folder
  6. Browse to the 3.2.41 folder
  7. Download the readme, and the correct firmware for the affected VSU, as listed above.

Manual Firmware Download in Mozilla, Firefox, and Opera:

  1. Open a browser and go in the address area enter:
    ftp://vpnet:[email protected]
  2. Browse to the vpnware3.2 folder
  3. Browse to the 3.2.41 folder
  4. Download the readme, and the correct firmware for the affected VSU, as listed above.

4. Additional Information:

Avaya has issued a Product Support Notice (PSN) #655U which contains more information about this issue. The advisory can be viewed at:

Additional information may also be available via the Avaya support website and through your Avaya account representative. Please contact your Avaya product support representative, or dial 1-800-242-2121, with any questions.

5. Disclaimer:

ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.

6. Revision History:

V 1.0 - February 9, 2006 - Initial Statement issued.

Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or [email protected].

� 2006 Avaya Inc. All Rights Reserved. All trademarks identified by the � or � are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.