Description
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2909-1 | strongswan security update |
Debian DSA |
DSA-5056-1 | strongswan security update |
EUVD |
EUVD-2021-31872 | In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. |
Ubuntu USN |
USN-5250-1 | strongSwan vulnerability |
Ubuntu USN |
USN-5250-2 | strongSwan vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:32:13.673Z
Reserved: 2021-12-16T00:00:00.000Z
Link: CVE-2021-45079
No data.
Status : Modified
Published: 2022-01-31T08:15:07.307
Modified: 2024-11-21T06:31:54.450
Link: CVE-2021-45079
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN