5

CVE-2015-8023

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

Data is provided by the National Vulnerability Database (NVD)
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version15.04
CanonicalUbuntu Linux Version15.10
StrongswanStrongswan Version4.2.12
StrongswanStrongswan Version4.2.13
StrongswanStrongswan Version4.2.14
StrongswanStrongswan Version4.2.15
StrongswanStrongswan Version4.2.16
StrongswanStrongswan Version4.3.0
StrongswanStrongswan Version4.3.1
StrongswanStrongswan Version4.3.2
StrongswanStrongswan Version4.3.3
StrongswanStrongswan Version4.3.4
StrongswanStrongswan Version4.3.5
StrongswanStrongswan Version4.3.6
StrongswanStrongswan Version4.3.7
StrongswanStrongswan Version4.4.0
StrongswanStrongswan Version4.4.1
StrongswanStrongswan Version4.5.0
StrongswanStrongswan Version4.5.1
StrongswanStrongswan Version4.5.2
StrongswanStrongswan Version4.5.3
StrongswanStrongswan Version4.6.0
StrongswanStrongswan Version4.6.1
StrongswanStrongswan Version4.6.2
StrongswanStrongswan Version4.6.3
StrongswanStrongswan Version4.6.4
StrongswanStrongswan Version5.0.0
StrongswanStrongswan Version5.0.1
StrongswanStrongswan Version5.0.2
StrongswanStrongswan Version5.0.3
StrongswanStrongswan Version5.0.4
StrongswanStrongswan Version5.1.0
StrongswanStrongswan Version5.1.1
StrongswanStrongswan Version5.1.2
StrongswanStrongswan Version5.1.3
StrongswanStrongswan Version5.2.0
StrongswanStrongswan Version5.2.1
StrongswanStrongswan Version5.2.2
StrongswanStrongswan Version5.2.3
StrongswanStrongswan Version5.3.0
StrongswanStrongswan Version5.3.1
StrongswanStrongswan Version5.3.2
StrongswanStrongswan Version5.3.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.8% 0.73
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.