Impact
strongMan encrypts sensitive database fields using AES‑CTR with a single global key and no per‑record IV, causing the same keystream to be reused across all entries. Because the certificates, which are public, are also encrypted in this manner, a database reader can recover a large portion of the keystream and decrypt any other credential stored in the database, including ECDSA private keys and EAP secrets. The result is that an attacker who can read the database can obtain all private keys used by the VPN.
Affected Systems
The vulnerability affects the strongswan:strongMan 0.1.0 release and earlier. The affected product is the management interface for strongSwan; all database fields are encrypted using the flawed scheme. The 0.2.0 version resolves the issue by switching to AES‑GCM‑SIV with per‑record random nonces and unique keys derived by HKDF.
Risk and Exploitability
The CVSS base score of 8.7 indicates a high severity risk. The EPSS score is below 1 %, so the likelihood of widespread exploitation remains low, and the vulnerability is not listed in the CISA KEV catalog. Nevertheless, if an attacker can read the database, credential compromise is almost guaranteed, making this flaw a high‑priority security problem. The primary attack vector is local or remote access to the database; no network exposure is required beyond database egress.
OpenCVE Enrichment