CVE-2021-45079
Published: 24 January 2022
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
Priority
Status
Package | Release | Status |
---|---|---|
strongswan
Launchpad, Ubuntu, Debian |
bionic |
Released
(5.6.2-1ubuntu2.8)
|
focal |
Released
(5.8.2-1ubuntu3.4)
|
|
hirsute |
Ignored
(end of life)
|
|
impish |
Released
(5.9.1-1ubuntu3.2)
|
|
jammy |
Released
(5.9.4-1ubuntu4)
|
|
kinetic |
Released
(5.9.4-1ubuntu4)
|
|
lunar |
Released
(5.9.4-1ubuntu4)
|
|
mantic |
Released
(5.9.4-1ubuntu4)
|
|
noble |
Released
(5.9.4-1ubuntu4)
|
|
trusty |
Released
(5.1.2-0ubuntu2.11+esm2)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(5.9.5)
|
|
xenial |
Released
(5.3.5-1ubuntu3.8+esm2)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
References
- https://github.com/strongswan/strongswan/releases/tag/5.9.5
- https://www.strongswan.org/blog/2022/01/24/strongswan-vulnerability-(cve-2021-45079).html
- https://ubuntu.com/security/notices/USN-5250-1
- https://ubuntu.com/security/notices/USN-5250-2
- https://www.cve.org/CVERecord?id=CVE-2021-45079
- NVD
- Launchpad
- Debian