CVE-2015-4171 — Sensitive Information Exposure in Strongswan
Severity
2.6LOWNVD
EPSS
1.0%
top 22.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 10
Latest updateMay 17
Description
strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.
CVSS vector
AV:N/AC:H/C:P/I:N/A:NExploitability: 4.9 | Impact: 2.9
Affected Packages4 packages
Also affects: Debian Linux 8.0, Ubuntu Linux 14.04, 14.10, 15.04
Patches
🔴Vulnerability Details
2📋Vendor Advisories
3💬Community
3Bugzilla▶
CVE-2015-4171 strongswan: rogue servers are able to gain user credentials from a client in certain IKEv2 setups [fedora-all]↗2015-06-12
Bugzilla▶
CVE-2015-4171 strongswan: rogue servers are able to gain user credentials from a client in certain IKEv2 setups↗2015-06-12
Bugzilla▶
CVE-2015-4171 strongswan: rogue servers are able to gain user credentials from a client in certain IKEv2 setups [epel-all]↗2015-06-12