CVE-2025-62291

In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.
Wrap or Wraparound
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
8.1 HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Debian logo
Debian Releases
Debian Product
Codename
strongswan
bullseye
vulnerable
bullseye (security)
5.9.1-1+deb11u5
fixed
bookworm
5.9.8-5+deb12u2
fixed
bookworm (security)
5.9.8-5+deb12u2
fixed
trixie (security)
6.0.1-6+deb13u2
fixed
trixie
6.0.1-6+deb13u2
fixed
forky
6.0.4-1
fixed
sid
6.0.4-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
strongswan
questing
Fixed 6.0.1-6ubuntu4.1
released
plucky
Fixed 5.9.13-2ubuntu4.25.04.1
released
noble
Fixed 5.9.13-2ubuntu4.24.04.1
released
jammy
Fixed 5.9.5-2ubuntu2.4
released
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
needs-triage