CVE-2021-45079 — NULL Pointer Dereference in Strongswan
Severity
9.1CRITICALNVD
EPSS
0.1%
top 70.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 31
Latest updateFeb 8
Description
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2
Affected Packages3 packages
Also affects: Debian Linux 10.0, 11.0, 9.0, Fedora 34, 35, Ubuntu Linux 14.04, 16.04, 18.04, 20.04, 21.10
🔴Vulnerability Details
3📋Vendor Advisories
4Microsoft▶
In strongSwan before 5.9.5 a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP↗2022-01-11
Debian▶
CVE-2021-45079: strongswan - In strongSwan before 5.9.5, a malicious responder can send an EAP-Success messag...↗2021