Linksys EtherFast BEFVP41 Cable/DSL VPN Router weak key encryption
|linksys-etherfast-weak-encryption (8397)||Low Risk|
Linksys EtherFast Cable/DSL VPN Router incorrectly truncates the key length for manually entered keys. If a user enters a 3DES key and MD5 authentication key, the keys are truncated to 23 bytes and 19 bytes respectively, which are both below the supposed allowed length. This vulnerability results in weaker than expected encryption.
No remedy available as of April 1, 2014.
- BugTraq Mailing List, Thu Mar 07 2002 - 18:41:16 CST: Linksys BEFVP41 VPN Server does not follow proper VPN standards.
- BID-4250: Linksys BEFVP41 Key Truncation Encryption Weakening Vulnerability
- CVE-2002-0426: VPN Server module in Linksys EtherFast BEFVP41 Cable/DSL VPN Router before 1.40.1 reduces the key lengths for keys that are supplied via manual key entry, which makes it easier for attackers to crack the keys.
- OSVDB ID: 6739: Linksys EtherFast VPN Router Encryption Key Implementation Weakness
- Linksys BEFVP41
Mar 08, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this