Vulnerabilities
Vulnerable Software
Strongswan:  >> Strongswan  >> 5.2.1  Security Vulnerabilities
The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
CVSS Score
7.5
EPSS Score
0.008
Published
2017-06-08
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
CVSS Score
5.0
EPSS Score
0.005
Published
2015-11-18
strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.
CVSS Score
2.6
EPSS Score
0.013
Published
2015-06-10


Contact Us

Shodan ® - All rights reserved