MEDIUM · 5.0

CVE-2015-8023

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to...

Vulnerability Description

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
CanonicalUbuntu Linux14.04
StrongswanStrongswan4.2.12

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-8023?

CVE-2015-8023 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to...

How severe is CVE-2015-8023?

CVE-2015-8023 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-8023?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Strongswan Strongswan.