Cisco Acknowledges Security Problem, Releases Stronger Protocol

Cisco this week acknowledged security problems with its proprietary Lightweight Extensible Authentication Protocol (LEAP) and released a new security protocol that it said eliminates the threat.

April 14, 2004

1 Min Read
NetworkComputing logo in a gray background | NetworkComputing

Cisco this week acknowledged security problems with its proprietary Lightweight Extensible Authentication Protocol (LEAP) and released a new security protocol that it said eliminates the threat.

The problems with LEAP were highlighted by the release last week of a tool that attacks the protocol. The tool, dubbed asleap, was released by Joshua Wright, a security architect for Johnson & Wales University.

This week, Cisco released its EAP Flexible Authentication via Secure Tunneling (EAP-FAST) protocol, which it said is not vulnerable to dictionary attacks. It announced the release -- and acknowledged the problems with LEAP - in a security notice posted on Cisco's Web site.

In that notice, Cisco acknowledged that, "as with most password-based authentication algorithms, Cisco LEAP is vulnerable to dictionary attacks." It described EAP-FAST as a protocol "for users who wish to deploy an 802.1X Extensible Authentication Protocol type that does not require digital certificates and is not vulnerable to dictionary attacks."

Cisco suggested that if users want to continue using LEAP, they should create a strong password policy. Otherwise, the security notice suggested, users may wish to migrate to EAP-FAST or similar protocols such as PEAP or EAP-TLS.

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights