LOW · 2.6

CVE-2015-4171

strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restr...

Vulnerability Description

strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.

CVSS Score

2.6

LOW

AV:N/AC:H/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
StrongswanStrongswan Vpn Client<= 1.4.5
CanonicalUbuntu Linux14.04
DebianDebian Linux8.0
StrongswanStrongswan4.3.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-4171?

CVE-2015-4171 is a vulnerability with a CVSS score of 2.6 (LOW). strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restr...

How severe is CVE-2015-4171?

CVE-2015-4171 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-4171?

Check the references section above for vendor advisories and patch information. Affected products include: Strongswan Strongswan Vpn Client, Canonical Ubuntu Linux, Debian Debian Linux, Strongswan Strongswan.