CVE-2026-25075

Publication date 23 March 2026

Last updated 25 March 2026


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

Description

strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the failure to validate AVP length fields before subtraction to trigger excessive memory allocation or NULL pointer dereference, crashing the charon IKE daemon.

Status

Package Ubuntu Release Status
strongswan 25.10 questing
Fixed 6.0.1-6ubuntu4.2
24.04 LTS noble
Fixed 5.9.13-2ubuntu4.24.04.2
22.04 LTS jammy
Fixed 5.9.5-2ubuntu2.5
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty
Needs evaluation

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-8117-1
    • strongSwan vulnerability
    • 23 March 2026

Other references


Access our resources on patching vulnerabilities