Description
In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9Attack Vector: Network
Complexity: High
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Affected Packages3 packages
🔴Vulnerability Details
2OSVCVE-2025-62291: In the eap-mschapv2 plugin (client-side) in strongSwan before 6↗2026-01-16 ▶ GHSAGHSA-p527-wjvq-vxg8: In the eap-mschapv2 plugin (client-side) in strongSwan before 6↗2026-01-16 ▶ 📋Vendor Advisories
3Red Hatstrongswan: strongSwan: Arbitrary Code Execution and Denial of Service via crafted EAP-MSCHAPv2 message↗2026-01-16 ▶ UbuntustrongSwan vulnerability↗2025-10-27 ▶ DebianCVE-2025-62291: strongswan - In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious...↗2025 ▶ 🕵️Threat Intelligence
3WizCVE-2025-62291 Impact, Exploitability, and Mitigation Steps | Wiz↗ ▶ WizCVE-2025-9615 Impact, Exploitability, and Mitigation Steps | Wiz↗ ▶ WizCVE-2026-25075 Impact, Exploitability, and Mitigation Steps | Wiz↗ ▶