Unknown
CVE-2006-3906
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- adaptive security appliance software 7.0,
- adaptive security appliance software 7.0(4),
- adaptive security appliance software 7.0(5),
- adaptive security appliance software 7.0.1.4,
- adaptive security appliance software 7.0.4.3,
- adaptive security appliance software 7.1(2),
- ios,
- pix asa ids,
- pix firewall 501,
- pix firewall 506,
- pix firewall 515,
- pix firewall 515e,
- pix firewall 520,
- pix firewall 525,
- pix firewall 535,
- pix firewall 6.2.2 .111,
- pix firewall 6.2.3 (110),
- pix firewall 6.3.3 (133),
- pix firewall 6.3.5 (112),
- pix firewall software 2.7,
- pix firewall software 3.0,
- pix firewall software 3.1,
- pix firewall software 4.0,
- pix firewall software 4.1(6),
- pix firewall software 4.1(6b),
- pix firewall software 4.2,
- pix firewall software 4.2(1),
- pix firewall software 4.2(2),
- pix firewall software 4.2(5),
- pix firewall software 4.3,
- pix firewall software 4.4,
- pix firewall software 4.4(4),
- pix firewall software 4.4(7.202),
- pix firewall software 4.4(8),
- pix firewall software 5.0,
- pix firewall software 5.1,
- pix firewall software 5.1(4),
- pix firewall software 5.1(4.206),
- pix firewall software 5.2,
- pix firewall software 5.2(1),
- pix firewall software 5.2(2),
- pix firewall software 5.2(3.210),
- pix firewall software 5.2(5),
- pix firewall software 5.2(6),
- pix firewall software 5.2(7),
- pix firewall software 5.2(9),
- pix firewall software 5.3,
- pix firewall software 5.3(1),
- pix firewall software 5.3(1.200),
- pix firewall software 5.3(2),
- pix firewall software 5.3(3),
- pix firewall software 6.0,
- pix firewall software 6.0(1),
- pix firewall software 6.0(2),
- pix firewall software 6.0(3),
- pix firewall software 6.0(4),
- pix firewall software 6.0(4.101),
- pix firewall software 6.1,
- pix firewall software 6.1(1),
- pix firewall software 6.1(2),
- pix firewall software 6.1(3),
- pix firewall software 6.1(4),
- pix firewall software 6.1(5),
- pix firewall software 6.1.5(104),
- pix firewall software 6.2,
- pix firewall software 6.2(1),
- pix firewall software 6.2(2),
- pix firewall software 6.2(3),
- pix firewall software 6.2(3.100),
- pix firewall software 6.3,
- pix firewall software 6.3(1),
- pix firewall software 6.3(2),
- pix firewall software 6.3(3),
- pix firewall software 6.3(3.102),
- pix firewall software 6.3(3.109),
- pix firewall software 6.3(5),
- secure pix firewall,
- vpn 3000 concentrator series software 2.0,
- vpn 3000 concentrator series software 2.5.2.a,
- vpn 3000 concentrator series software 2.5.2.b,
- vpn 3000 concentrator series software 2.5.2.c,
- vpn 3000 concentrator series software 2.5.2.d,
- vpn 3000 concentrator series software 2.5.2.f,
- vpn 3000 concentrator series software 3.0,
- vpn 3000 concentrator series software 3.0.3.a,
- vpn 3000 concentrator series software 3.0.3.b,
- vpn 3000 concentrator series software 3.0.4,
- vpn 3000 concentrator series software 3.1,
- vpn 3000 concentrator series software 3.1(rel),
- vpn 3000 concentrator series software 3.1.1,
- vpn 3000 concentrator series software 3.1.2,
- vpn 3000 concentrator series software 3.1.4,
- vpn 3000 concentrator series software 3.5(rel),
- vpn 3000 concentrator series software 3.5.1,
- vpn 3000 concentrator series software 3.5.2,
- vpn 3000 concentrator series software 3.5.3,
- vpn 3000 concentrator series software 3.5.4,
- vpn 3000 concentrator series software 3.5.5,
- vpn 3000 concentrator series software 3.6,
- vpn 3000 concentrator series software 3.6.1,
- vpn 3000 concentrator series software 3.6.3,
- vpn 3000 concentrator series software 3.6.5,
- vpn 3000 concentrator series software 3.6.7,
- vpn 3000 concentrator series software 3.6.7.a,
- vpn 3000 concentrator series software 3.6.7.b,
- vpn 3000 concentrator series software 3.6.7.c,
- vpn 3000 concentrator series software 3.6.7.d,
- vpn 3000 concentrator series software 3.6.7.f,
- vpn 3000 concentrator series software 3.6.7d,
- vpn 3000 concentrator series software 4.0,
- vpn 3000 concentrator series software 4.0.1,
- vpn 3000 concentrator series software 4.0.2,
- vpn 3000 concentrator series software 4.0.5.b,
- vpn 3000 concentrator series software 4.1,
- vpn 3000 concentrator series software 4.1.5.b,
- vpn 3000 concentrator series software 4.1.7.a,
- vpn 3000 concentrator series software 4.1.7.b,
- vpn 3000 concentrator series software 4.1.7.l,
- vpn 3000 concentrator series software 4.7,
- vpn 3000 concentrator series software 4.7(rel),
- vpn 3000 concentrator series software 4.7.1,
- vpn 3000 concentrator series software 4.7.1.f,
- vpn 3000 concentrator series software 4.7.2,
- vpn 3000 concentrator series software 4.7.2.a,
- vpn 3000 concentrator series software 4.7.2.f,
- vpn 3001 concentrator,
- vpn 3005 concentrator software 4.0.1,
- vpn 3015 concentrator,
- vpn 3020 concentrator,
- vpn 3030 concentator,
- vpn 3030 concentator 4.7(rel),
- vpn 3030 concentator 4.7.1,
- vpn 3030 concentator 4.7.1.f,
- vpn 3030 concentator 4.7.2,
- vpn 3030 concentator 4.7.2.a,
- vpn 3030 concentator 4.7.2.f,
- vpn 3060 concentrator,
- vpn 3080 concentrator
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: