Cisco Security Advisory: Vulnerabilities in the Internet Key Exchange Xauth Implementation