CVE-2026-25075

EUVD-2026-14477
strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the failure to validate AVP length fields before subtraction to trigger excessive memory allocation or NULL pointer dereference, crashing the charon IKE daemon.
Wrap or Wraparound
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
VulnCheckCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 46%
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
strongswanstrongswan
4.5.0 ≤
𝑥
< 6.0.5
CNA
Debian logo
Debian Releases
Debian Product
Codename
strongswan
bookworm
vulnerable
bookworm (security)
5.9.8-5+deb12u4
fixed
bullseye
vulnerable
bullseye (security)
5.9.1-1+deb11u6
fixed
forky
6.0.6-1
fixed
sid
6.0.6-1
fixed
trixie
vulnerable
trixie (security)
6.0.1-6+deb13u5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
strongswan
bionic
needs-triage
focal
needs-triage
jammy
Fixed 5.9.5-2ubuntu2.5
released
noble
Fixed 5.9.13-2ubuntu4.24.04.2
released
questing
Fixed 6.0.1-6ubuntu4.2
released
resolute
not-affected
trusty
needs-triage
xenial
needs-triage
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
strongswan
suse enterprise desktop 15 SP7
5.9.14-150700.3.9.1
fixed
suse enterprise sap 15 SP7
5.9.14-150700.3.9.1
fixed
suse enterprise server 12 SP3
5.1.3-26.32.1
fixed
suse enterprise server 12 SP5
5.1.3-26.32.1
fixed
suse enterprise server 15 SP4
5.9.11-150400.19.26.1
fixed
suse enterprise server 15 SP5
5.9.11-150500.5.14.1
fixed
suse enterprise server 15 SP6
5.9.12-150600.3.11.1
fixed
suse enterprise server 15 SP7
5.9.14-150700.3.9.1
fixed
strongswan-doc
suse enterprise desktop 15 SP7
5.9.14-150700.3.9.1
fixed
suse enterprise sap 15 SP7
5.9.14-150700.3.9.1
fixed
suse enterprise server 12 SP3
5.1.3-26.32.1
fixed
suse enterprise server 12 SP5
5.1.3-26.32.1
fixed
suse enterprise server 15 SP4
5.9.11-150400.19.26.1
fixed
suse enterprise server 15 SP5
5.9.11-150500.5.14.1
fixed
suse enterprise server 15 SP6
5.9.12-150600.3.11.1
fixed
suse enterprise server 15 SP7
5.9.14-150700.3.9.1
fixed
strongswan-hmac
suse enterprise desktop 15 SP7
5.9.14-150700.3.9.1
fixed
suse enterprise sap 15 SP7
5.9.14-150700.3.9.1
fixed
suse enterprise server 12 SP3
5.1.3-26.32.1
fixed
suse enterprise server 12 SP5
5.1.3-26.32.1
fixed
suse enterprise server 15 SP4
5.9.11-150400.19.26.1
fixed
suse enterprise server 15 SP5
5.9.11-150500.5.14.1
fixed
suse enterprise server 15 SP6
5.9.12-150600.3.11.1
fixed
suse enterprise server 15 SP7
5.9.14-150700.3.9.1
fixed
strongswan-ipsec
suse enterprise desktop 15 SP7
5.9.14-150700.3.9.1
fixed
suse enterprise sap 15 SP7
5.9.14-150700.3.9.1
fixed
suse enterprise server 12 SP3
5.1.3-26.32.1
fixed
suse enterprise server 12 SP5
5.1.3-26.32.1
fixed
suse enterprise server 15 SP4
5.9.11-150400.19.26.1
fixed
suse enterprise server 15 SP5
5.9.11-150500.5.14.1
fixed
suse enterprise server 15 SP6
5.9.12-150600.3.11.1
fixed
suse enterprise server 15 SP7
5.9.14-150700.3.9.1
fixed
strongswan-libs0
suse enterprise desktop 15 SP7
5.9.14-150700.3.9.1
fixed
suse enterprise sap 15 SP7
5.9.14-150700.3.9.1
fixed
suse enterprise server 12 SP3
5.1.3-26.32.1
fixed
suse enterprise server 12 SP5
5.1.3-26.32.1
fixed
suse enterprise server 15 SP4
5.9.11-150400.19.26.1
fixed
suse enterprise server 15 SP5
5.9.11-150500.5.14.1
fixed
suse enterprise server 15 SP6
5.9.12-150600.3.11.1
fixed
suse enterprise server 15 SP7
5.9.14-150700.3.9.1
fixed