strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3663-1 | strongswan security update |
![]() |
DSA-5560-1 | strongswan security update |
![]() |
USN-6488-1 | strongSwan vulnerability |
![]() |
USN-6488-2 | strongSwan vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 17 Jan 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-17T20:02:49.898Z
Reserved: 2023-09-05T00:00:00
Link: CVE-2023-41913

No data.

Status : Modified
Published: 2023-12-07T05:15:09.173
Modified: 2025-01-17T20:15:26.993
Link: CVE-2023-41913

No data.

No data.