Identifying and Mitigating Security Exposures When Using No Payload Encryption Images with Existing Cryptographic Configuration
|
System information
|
|
|
Affected software |
Cisco |
Description
|
Cisco IOS Software and Cisco IOS XE Software images come in two types: The regular universalk9 image and the No Payload Encryption (NPE) universalk9_npe image. NPE images were introduced to satisfy import requirements in some countries that require that the platform does not support strong payload cryptography. As such, NPE images lack support for certain cryptographic features, most notably IPsec VPN and Secure Unified Communications. As result, when running an NPE image, the CLI parser no
More info:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-npe-hardening-Dkel83jP?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Identifying%20and%20Mitigating%20Security%20Exposures%20When%20Using%20No%20Payload%20Encryption%20Images%20with%20Existing%20Cryptographic%20Configuration&vs_k=1 |
Standar resources
|
Property |
Value |
CVE |
|