Severity

5.3

Vulnerability Type

Allocation of Resources Without Limits or Throttling (CWE-770)

Summary

An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.