CVE-2015-8023
Summary
| CVE | CVE-2015-8023 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-11-18 16:59:07 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. |
Risk And Classification
Primary CVSS: v2.0 5 from [email protected]
AV:N/AC:L/Au:N/C:N/I:P/A:N
Problem Types: CWE-20 | CWE-264 | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
PartialAvailability
NoneAV:N/AC:L/Au:N/C:N/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 15.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 15.10 | All | All | All |
| Application | Strongswan | Strongswan | 4.2.12 | All | All | All |
| Application | Strongswan | Strongswan | 4.2.13 | All | All | All |
| Application | Strongswan | Strongswan | 4.2.14 | All | All | All |
| Application | Strongswan | Strongswan | 4.2.15 | All | All | All |
| Application | Strongswan | Strongswan | 4.2.16 | All | All | All |
| Application | Strongswan | Strongswan | 4.3.0 | All | All | All |
| Application | Strongswan | Strongswan | 4.3.1 | All | All | All |
| Application | Strongswan | Strongswan | 4.3.2 | All | All | All |
| Application | Strongswan | Strongswan | 4.3.3 | All | All | All |
| Application | Strongswan | Strongswan | 4.3.4 | All | All | All |
| Application | Strongswan | Strongswan | 4.3.5 | All | All | All |
| Application | Strongswan | Strongswan | 4.3.6 | All | All | All |
| Application | Strongswan | Strongswan | 4.3.7 | All | All | All |
| Application | Strongswan | Strongswan | 4.4.0 | All | All | All |
| Application | Strongswan | Strongswan | 4.4.1 | All | All | All |
| Application | Strongswan | Strongswan | 4.5.0 | All | All | All |
| Application | Strongswan | Strongswan | 4.5.1 | All | All | All |
| Application | Strongswan | Strongswan | 4.5.2 | All | All | All |
| Application | Strongswan | Strongswan | 4.5.3 | All | All | All |
| Application | Strongswan | Strongswan | 4.6.0 | All | All | All |
| Application | Strongswan | Strongswan | 4.6.1 | All | All | All |
| Application | Strongswan | Strongswan | 4.6.2 | All | All | All |
| Application | Strongswan | Strongswan | 4.6.3 | All | All | All |
| Application | Strongswan | Strongswan | 4.6.4 | All | All | All |
| Application | Strongswan | Strongswan | 5.0.0 | All | All | All |
| Application | Strongswan | Strongswan | 5.0.1 | All | All | All |
| Application | Strongswan | Strongswan | 5.0.2 | All | All | All |
| Application | Strongswan | Strongswan | 5.0.3 | All | All | All |
| Application | Strongswan | Strongswan | 5.0.4 | All | All | All |
| Application | Strongswan | Strongswan | 5.1.0 | All | All | All |
| Application | Strongswan | Strongswan | 5.1.1 | All | All | All |
| Application | Strongswan | Strongswan | 5.1.2 | All | All | All |
| Application | Strongswan | Strongswan | 5.1.3 | All | All | All |
| Application | Strongswan | Strongswan | 5.2.0 | All | All | All |
| Application | Strongswan | Strongswan | 5.2.1 | All | All | All |
| Application | Strongswan | Strongswan | 5.2.2 | All | All | All |
| Application | Strongswan | Strongswan | 5.2.3 | All | All | All |
| Application | Strongswan | Strongswan | 5.3.0 | All | All | All |
| Application | Strongswan | Strongswan | 5.3.1 | All | All | All |
| Application | Strongswan | Strongswan | 5.3.2 | All | All | All |
| Application | Strongswan | Strongswan | 5.3.3 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| strongSwan - strongSwan Vulnerability (CVE-2015-8023) | af854a3a-2127-422b-91ae-364da2661108 | www.strongswan.org | |
| USN-2811-1: strongSwan vulnerability | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| [security-announce] SUSE-SU-2015:2183-2: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| strongSwan CVE-2015-8023 Authentication Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| openSUSE-SU-2015:2103-1: moderate: Security update for strongswan | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Debian -- Security Information -- DSA-3398-1 strongswan | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| strongSwan - strongSwan Vulnerability (CVE-2015-8023) | MITRE | www.strongswan.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.