Vulnerability Details : CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
Vulnerability category: Input validation
Products affected by CVE-2015-8023
- cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:4.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:strongswan:strongswan:5.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-8023
0.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8023
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2015-8023
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8023
-
https://www.strongswan.org/blog/2015/11/16/strongswan-vulnerability-(cve-2015-8023).html
strongSwan - strongSwan Vulnerability (CVE-2015-8023)
-
http://www.debian.org/security/2015/dsa-3398
Debian -- Security Information -- DSA-3398-1 strongswan
-
http://www.securityfocus.com/bid/84947
strongSwan CVE-2015-8023 Authentication Bypass Vulnerability
-
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00025.html
[security-announce] SUSE-SU-2015:2183-2: important: Security update for
-
http://www.ubuntu.com/usn/USN-2811-1
USN-2811-1: strongSwan vulnerability | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-updates/2015-11/msg00139.html
openSUSE-SU-2015:2103-1: moderate: Security update for strongswan
Jump to