Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
strongswan strongswan vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2004-0590
FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x prior to 1.0.6, openswan 2.x prior to 2.1.4, and strongSwan prior to 2.1.3, allows remote malicious users to authenticate using spoofed PKCS#7 certificates in which a self-signed certifica...
Frees Wan Frees Wan 1
Frees Wan Frees Wan 2
Frees Wan Super Frees Wan 1
Openswan Openswan 1
Openswan Openswan 2
Strongswan Strongswan
7.5
CVSSv2
CVE-2015-3991
strongSwan 5.2.2 and 5.3.0 allows remote malicious users to cause a denial of service (daemon crash) or execute arbitrary code.
Strongswan Strongswan 5.2.2
Strongswan Strongswan 5.3.0
7.5
CVSSv2
CVE-2012-2388
The GMP Plugin in strongSwan 4.2.0 up to and including 4.6.3 allows remote malicious users to bypass authentication via a (1) empty or (2) zeroed RSA signature, aka "RSA signature verification vulnerability."
Strongswan Strongswan 4.2.16
Strongswan Strongswan 4.2.9
Strongswan Strongswan 4.2.6
Strongswan Strongswan 4.2.15
Strongswan Strongswan 4.2.1
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.6.0
Strongswan Strongswan 4.6.1
Strongswan Strongswan 4.4.1
Strongswan Strongswan 4.2.11
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.5
Strongswan Strongswan 4.2.0
Strongswan Strongswan 4.3.5
Strongswan Strongswan 4.4.0
Strongswan Strongswan 4.5.1
Strongswan Strongswan 4.5.0
Strongswan Strongswan 4.2.13
Strongswan Strongswan 4.2.12
Strongswan Strongswan 4.2.3
Strongswan Strongswan 4.2.4
Strongswan Strongswan 4.3.4
7.5
CVSSv2
CVE-2010-2628
The IKE daemon in strongSwan 4.3.x prior to 4.3.7 and 4.4.x prior to 4.4.1 does not properly check the return values of snprintf calls, which allows remote malicious users to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
Strongswan Strongswan 4.3.3
Strongswan Strongswan 4.3.4
Strongswan Strongswan 4.3.5
Strongswan Strongswan 4.3.0
Strongswan Strongswan 4.3.1
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.3.6
Strongswan Strongswan 4.4.0
6.4
CVSSv2
CVE-2014-2338
IKEv2 in strongSwan 4.0.7 prior to 5.1.3 allows remote malicious users to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
Strongswan Strongswan 5.1.2
Strongswan Strongswan 5.1.1
Strongswan Strongswan 4.6.0
Strongswan Strongswan 4.6.1
Strongswan Strongswan 4.5.3
Strongswan Strongswan 4.4.0
Strongswan Strongswan 5.0.1
Strongswan Strongswan 5.0.2
Strongswan Strongswan 4.6.4
Strongswan Strongswan 4.5.0
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.3.3
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.11
Strongswan Strongswan 4.3.6
Strongswan Strongswan 4.3.7
Strongswan Strongswan 4.2.14
Strongswan Strongswan 4.2.15
Strongswan Strongswan 4.2.7
Strongswan Strongswan 4.2.8
Strongswan Strongswan 4.2.9
Strongswan Strongswan 4.1.4
5.8
CVSSv2
CVE-2021-45079
In strongSwan prior to 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
Strongswan Strongswan
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Fedoraproject Fedora 34
Fedoraproject Extra Packages For Enterprise Linux 8.0
Fedoraproject Fedora 35
Fedoraproject Extra Packages For Enterprise Linux 9.0
Fedoraproject Extra Packages For Enterprise Linux 7.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 21.10
5.1
CVSSv2
CVE-2013-2054
Buffer overflow in the atodn function in strongSwan 2.0.0 up to and including 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote malicious users to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via ...
Strongswan Strongswan 2.4.3
Strongswan Strongswan 2.5.7
Strongswan Strongswan 2.4.2
Strongswan Strongswan 4.1.8
Strongswan Strongswan 4.1.11
Strongswan Strongswan 2.6.16
Strongswan Strongswan 2.5.3
Strongswan Strongswan 2.8.0
Strongswan Strongswan 4.2.6
Strongswan Strongswan 2.8.1
Strongswan Strongswan 2.4.4
Strongswan Strongswan 2.6.0
Strongswan Strongswan 2.3.0
Strongswan Strongswan 4.2.12
Strongswan Strongswan 4.1.1
Strongswan Strongswan 2.7.2
Strongswan Strongswan 4.2.10
Strongswan Strongswan 2.1.0
Strongswan Strongswan 2.1.5
Strongswan Strongswan 2.0.2
Strongswan Strongswan 2.8.9
Strongswan Strongswan 2.8.8
5
CVSSv2
CVE-2021-41990
The gmp plugin in strongSwan prior to 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.
Strongswan Strongswan
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Siemens 6gk6108-4am00-2ba2 Firmware -
Siemens 6gk6108-4am00-2da2 Firmware -
Siemens 6gk5804-0ap00-2aa2 Firmware -
Siemens 6gk5812-1aa00-2aa2 Firmware -
Siemens 6gk5812-1ba00-2aa2 Firmware -
Siemens 6gk5816-1aa00-2aa2 Firmware -
Siemens 6gk5816-1ba00-2aa2 Firmware -
Siemens 6gk5826-2ab00-2ab2 Firmware -
Siemens 6gk5874-2aa00-2aa2 Firmware -
Siemens 6gk5874-3aa00-2aa2 Firmware -
Siemens 6gk5876-3aa02-2ba2 Firmware -
Siemens 6gk5876-3aa02-2ea2 Firmware -
Siemens 6gk5876-4aa00-2ba2 Firmware -
Siemens 6gk5876-4aa00-2da2 Firmware -
Siemens 6gk5856-2ea00-3da1 Firmware -
Siemens 6gk5856-2ea00-3aa1 Firmware -
5
CVSSv2
CVE-2021-41991
The in-memory certificate cache in strongSwan prior to 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by m...
Strongswan Strongswan
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Siemens Sinema Remote Connect Server -
Siemens Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Firmware -
Siemens Simatic Cp 1243-1 Firmware -
Siemens Simatic Cp 1242-7 Gprs V2 Firmware -
Siemens Simatic Net Cp 1243-8 Irc Firmware -
Siemens Scalance Sc632-2c Firmware -
Siemens Siplus Et 200sp Cp 1543sp-1 Isec Firmware -
Siemens Cp 1543-1 Firmware -
Siemens Simatic Net Cp 1545-1 Firmware -
Siemens Simatic Cp 1543sp-1 Firmware -
Siemens Simatic Net Cp1243-7 Lte Eu Firmware -
Siemens Simatic Cp 1243-7 Lte\\/us Firmware -
Siemens Simatic Cp 1542sp-1 Firmware -
Siemens Scalance Sc636-2c Firmware -
Siemens Simatic Cp 1542sp-1 Irc Firmware -
5
CVSSv2
CVE-2018-17540
The gmp plugin in strongSwan prior to 5.7.1 has a Buffer Overflow via a crafted certificate.
Strongswan Strongswan
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »