Enlarge (credit: NSA)

In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have uncovered an attack that remotely extracts decryption keys from the company's now-decommissioned line of PIX firewalls.

The discovery is significant because the attack code, dubbed BenignCertain, worked on PIX versions Cisco released in 2002 and supported through 2009. Even after Cisco stopped providing PIX bug fixes in July 2009, the company continued offering limited service and support for the product for an additional four years. Unless PIX customers took special precautions, virtually all of them were vulnerable to attacks that surreptitiously eavesdropped on their VPN traffic. Beyond allowing attackers to snoop on encrypted VPN traffic, the key extraction also makes it possible to gain full access to a vulnerable network by posing as a remote user.

BenignCertain's capabilities were tentatively revealed in this blog post from Thursday, and they were later confirmed to work on real-world PIX installations by three separate researchers. Before the confirmation came, Ars asked Cisco to investigate the exploit. The company declined, citing this policy for so-called end-of-life products. The exploit helps explain documents leaked by NSA contractor Edward Snowden and cited in a 2014 article that appeared in Der Spiegel. The article reported that the NSA had the ability to decrypt more than 1,000 VPN connections per hour.

Read 8 remaining paragraphs | Comments

MatrixSSL Multiple Information Disclosure Vulnerabilities
Facebook HHVM Multiple Integer Overflow and Denial of Service Vulnerabilities
Apple iOS/tvOS/Safari Multiple Security Vulnerabilities
[CVE-2016-6582] Doorkeeper gem does not revoke tokens & uses wrong auth/auth method
Geeklog IVYWE CVE-2016-4849 Multiple Cross Site Scripting Vulnerabilities
Horizontal Privilege Escalation/Code Injection in ownCloudâ??s Windows Client
Navis WebAccess Unspecified SQL Injection Vulnerability
Internet Storm Center Infocon Status