Vulnerability Details CVE-2023-41913
strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.117
EPSS Ranking 93.3%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2023-41913
-
cpe:2.3:a:strongswan:strongswan:5.3.0
-
cpe:2.3:a:strongswan:strongswan:5.3.1
-
cpe:2.3:a:strongswan:strongswan:5.3.2
-
cpe:2.3:a:strongswan:strongswan:5.3.3
-
cpe:2.3:a:strongswan:strongswan:5.3.4
-
cpe:2.3:a:strongswan:strongswan:5.3.5
-
cpe:2.3:a:strongswan:strongswan:5.4.0
-
cpe:2.3:a:strongswan:strongswan:5.5.0
-
cpe:2.3:a:strongswan:strongswan:5.5.1
-
cpe:2.3:a:strongswan:strongswan:5.5.2
-
cpe:2.3:a:strongswan:strongswan:5.5.3
-
cpe:2.3:a:strongswan:strongswan:5.6.0
-
cpe:2.3:a:strongswan:strongswan:5.6.1
-
cpe:2.3:a:strongswan:strongswan:5.6.2
-
cpe:2.3:a:strongswan:strongswan:5.6.3
-
cpe:2.3:a:strongswan:strongswan:5.7.0
-
cpe:2.3:a:strongswan:strongswan:5.7.1
-
cpe:2.3:a:strongswan:strongswan:5.7.2
-
cpe:2.3:a:strongswan:strongswan:5.8.2
-
cpe:2.3:a:strongswan:strongswan:5.9.0
-
cpe:2.3:a:strongswan:strongswan:5.9.1
-
cpe:2.3:a:strongswan:strongswan:5.9.10
-
cpe:2.3:a:strongswan:strongswan:5.9.11
-
cpe:2.3:a:strongswan:strongswan:5.9.2
-
cpe:2.3:a:strongswan:strongswan:5.9.3
-
cpe:2.3:a:strongswan:strongswan:5.9.4
-
cpe:2.3:a:strongswan:strongswan:5.9.5
-
cpe:2.3:a:strongswan:strongswan:5.9.6
-
cpe:2.3:a:strongswan:strongswan:5.9.7
-
cpe:2.3:a:strongswan:strongswan:5.9.8
-
cpe:2.3:a:strongswan:strongswan:5.9.9