Input validation error in strongSwan - CVE-2015-8023

 

Input validation error in strongSwan - CVE-2015-8023

Published: November 18, 2015 / Updated: July 28, 2020


Vulnerability identifier: #VU32362
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-8023
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: strongswan.org
Affected software:
strongSwan

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.


How to mitigate CVE-2015-8023

Install update from vendor's website.

Sources