CVE-2026-25075 PUBLISHED

strongSwan 4.5.0 < 6.0.5 EAP-TTLS AVP Parsing Integer Underflow

Assigner: VulnCheck
Reserved: 28.01.2026 Published: 23.03.2026 Updated: 23.03.2026

strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the failure to validate AVP length fields before subtraction to trigger excessive memory allocation or NULL pointer dereference, crashing the charon IKE daemon.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor strongSwan
Product strongSwan
Versions Default: unaffected
  • affected from 4.5.0 to 6.0.5 (excl.)

Credits

  • Kazuma Matsumoto, a security researcher at GMO Cybersecurity by IERAE, Inc. finder
  • VulnCheck coordinator

References

Problem Types

  • CWE-191 Integer underflow (wrap or wraparound) CWE
  • CWE-476 NULL pointer dereference CWE