Description
strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.
References (6)
Core 6
Core References
Release Notes
https://github.com/strongswan/strongswan/releases
Vendor Advisory
https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html
Vendor Advisory
https://security.netapp.com/advisory/ntap-20250117-0003/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/YPJZPYHBCRXUQGGKQE6TYH4J4RIJH6HO/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPJZPYHBCRXUQGGKQE6TYH4J4RIJH6HO/
Scores
CVSS v3
9.8
EPSS
0.0532
EPSS Percentile
90.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-120
Status
published
Products (1)
strongswan/strongswan
5.3.0 - 5.9.12
Published
Dec 07, 2023
Tracked Since
Feb 18, 2026