{"api_version":"1","generated_at":"2026-04-23T09:52:02+00:00","cve":"CVE-2020-1763","urls":{"html":"https://cve.report/CVE-2020-1763","api":"https://cve.report/api/cve/CVE-2020-1763.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-1763","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-1763"},"summary":{"title":"CVE-2020-1763","description":"An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2020-05-12 14:15:00","updated_at":"2023-11-07 03:19:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04","refsource":"MISC","tags":[],"title":"Siemens RUGGEDCOM ROX II | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1763","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1763","refsource":"CONFIRM","tags":["Issue Tracking","Third Party Advisory"],"title":"1814541 – (CVE-2020-1763) CVE-2020-1763 libreswan: DoS attack via malicious IKEv1 informational exchange message","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2020/dsa-4684","name":"DSA-4684","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-4684-1 libreswan","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://libreswan.org/security/CVE-2020-1763/CVE-2020-1763.txt","name":"https://libreswan.org/security/CVE-2020-1763/CVE-2020-1763.txt","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"","mime":"text/x-diff","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/libreswan/libreswan/commit/471a3e41a449d7c753bc4edbba4239501bb62ba8","name":"https://github.com/libreswan/libreswan/commit/471a3e41a449d7c753bc4edbba4239501bb62ba8","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"security: Fix for CVE-2020-1763 · libreswan/libreswan@471a3e4 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202007-21","name":"GLSA-202007-21","refsource":"GENTOO","tags":[],"title":"Libreswan: Denial of service (GLSA 202007-21) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1813329","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1813329","refsource":"MISC","tags":["Issue Tracking","Third Party Advisory"],"title":"Bug Access Denied","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-1763","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1763","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"1763","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"libreswan","cpe5":"libreswan","cpe6":"3.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"1763","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"libreswan","cpe5":"libreswan","cpe6":"3.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"1763","vulnerable":"1","versionEndIncluding":"3.31","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"libreswan","cpe5":"libreswan","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-1763","qid":"501057","title":"Alpine Linux Security Update for libreswan"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-1763","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"the libreswan Project","product":{"product_data":[{"product_name":"libreswan","version":{"version_data":[{"version_value":"from versions 3.27 till 3.31"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-125"}]}]},"references":{"reference_data":[{"url":"https://libreswan.org/security/CVE-2020-1763/CVE-2020-1763.txt","name":"https://libreswan.org/security/CVE-2020-1763/CVE-2020-1763.txt","refsource":"CONFIRM"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1763","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1763","refsource":"CONFIRM"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1813329","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1813329","refsource":"MISC"},{"url":"https://github.com/libreswan/libreswan/commit/471a3e41a449d7c753bc4edbba4239501bb62ba8","name":"https://github.com/libreswan/libreswan/commit/471a3e41a449d7c753bc4edbba4239501bb62ba8","refsource":"CONFIRM"},{"refsource":"DEBIAN","name":"DSA-4684","url":"https://www.debian.org/security/2020/dsa-4684"},{"refsource":"GENTOO","name":"GLSA-202007-21","url":"https://security.gentoo.org/glsa/202007-21"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf"},{"refsource":"MISC","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04","url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04"}]},"description":{"description_data":[{"lang":"eng","value":"An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash."}]},"impact":{"cvss":[[{"vectorString":"7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"}]]}},"nvd":{"publishedDate":"2020-05-12 14:15:00","lastModifiedDate":"2023-11-07 03:19:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:libreswan:libreswan:3.5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*","versionStartIncluding":"3.27","versionEndIncluding":"3.31","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"1763","Ordinal":"161001","Title":"CVE-2020-1763","CVE":"CVE-2020-1763","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"1763","Ordinal":"1","NoteData":"An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"1763","Ordinal":"2","NoteData":"2020-05-12","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"1763","Ordinal":"3","NoteData":"2021-02-12","Type":"Other","Title":"Modified"}]}}}