CVE-2026-25075
Publication date 23 March 2026
Last updated 25 March 2026
Ubuntu priority
Cvss 3 Severity Score
Description
strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the failure to validate AVP length fields before subtraction to trigger excessive memory allocation or NULL pointer dereference, crashing the charon IKE daemon.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| strongswan | 25.10 questing |
Fixed 6.0.1-6ubuntu4.2
|
| 24.04 LTS noble |
Fixed 5.9.13-2ubuntu4.24.04.2
|
|
| 22.04 LTS jammy |
Fixed 5.9.5-2ubuntu2.5
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty |
Needs evaluation
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-8117-1
- strongSwan vulnerability
- 23 March 2026