CVE-2022-4967
- EPSS 0.05%
- Published 14.05.2024 11:57:00
- Last modified 22.08.2025 15:04:16
strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). When certificates are used to authenticate clients in TLS-based EAP methods, the IKE or EAP identity...
CVE-2023-41913
- EPSS 11.73%
- Published 07.12.2023 05:15:09
- Last modified 17.01.2025 20:15:26
strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a craft...
CVE-2023-26463
- EPSS 12.16%
- Published 15.04.2023 00:15:07
- Last modified 07.02.2025 22:15:12
strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer deref...
CVE-2022-40617
- EPSS 0.21%
- Published 31.10.2022 06:15:09
- Last modified 06.05.2025 19:15:56
strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control...
CVE-2021-45079
- EPSS 0.1%
- Published 31.01.2022 08:15:07
- Last modified 21.11.2024 06:31:54
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without serv...
CVE-2021-41991
- EPSS 2.33%
- Published 18.10.2021 14:15:10
- Last modified 21.11.2024 06:27:02
The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less...
CVE-2021-41990
- EPSS 2%
- Published 18.10.2021 14:15:10
- Last modified 21.11.2024 06:27:01
The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution ...
CVE-2019-10155
- EPSS 0.23%
- Published 12.06.2019 14:29:02
- Last modified 21.11.2024 04:18:32
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check v...
CVE-2018-17540
- EPSS 3.98%
- Published 03.10.2018 20:29:09
- Last modified 21.11.2024 03:54:34
The gmp plugin in strongSwan before 5.7.1 has a Buffer Overflow via a crafted certificate.
CVE-2018-16152
- EPSS 1.33%
- Published 26.09.2018 21:29:01
- Last modified 21.11.2024 03:52:10
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature ve...