First published: Fri Apr 14 2023(Updated: )
strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Strongswan Strongswan | =5.9.8 | |
Strongswan Strongswan | =5.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26463 is a vulnerability in strongSwan 5.9.8 and 5.9.9 that potentially allows remote code execution.
The severity of CVE-2023-26463 is 9.8 (critical).
CVE-2023-26463 allows remote code execution by using a variable named "public" for two different purposes within the same function, leading to incorrect access control and an expired pointer dereference.
strongSwan versions 5.9.8 and 5.9.9 are affected by CVE-2023-26463.
To fix CVE-2023-26463, upgrade to a version of strongSwan that is not affected by the vulnerability.