The vulnerability is a result of insufficient validation of attributes in the GDOI and G-IKEv2 protocols, making it possible for an attacker to compromise a key server or modify the configuration of a group member.
The vulnerability is a result of insufficient validation of attributes in the GDOI and G-IKEv2 protocols, making it possible for an attacker to compromise a key server or modify the configuration of a group member.