CVE-2023-2295 PUBLISHED CVSS 9.300000190734863 CRITICAL

A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.

EPSS 1.63% · 81.8th percentile

Risk Scores

CVSS v4.0
9.300000190734863
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS Score
1.63%
81.8th percentile

Affected Products

VendorProductVersions
redhatenterprise_linux_eus9.2, 8.8, 9.2
libreswanlibreswan4.9-1.el8, 4.9-1.el9, 4.9-1.el8
redhatenterprise_linux_server_tus8.8, 8.8
redhatenterprise_linux_server_aus8.8, 9.2, 8.8
n/alibreswanAffects libreswan v4.9-1.el8 and libreswan v4.9-1.el9, Fixed in libreswan v4.9-3.el8_8 and libreswan v4.9-4.el9_2, Affects libreswan v4.9-1.el8 and libreswan v4.9-1.el9, Fixed in libreswan v4.9-3.el8_8 and libreswan v4.9-4.el9_2
redhatenterprise_linux9.0, 8.0, 9.0

Timeline

References

Open in Interactive Console →