Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4359-1 | strongswan security update |
Debian DSA |
DSA-6041-1 | strongswan security update |
Ubuntu USN |
USN-7841-1 | strongSwan vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 16 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 16 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow. | |
| First Time appeared |
Strongswan
Strongswan strongswan |
|
| Weaknesses | CWE-191 | |
| CPEs | cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Strongswan
Strongswan strongswan |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-16T19:07:43.455Z
Reserved: 2025-10-10T00:00:00.000Z
Link: CVE-2025-62291
Updated: 2026-01-16T19:07:43.455Z
Status : Received
Published: 2026-01-16T19:16:18.163
Modified: 2026-01-16T19:16:18.163
Link: CVE-2025-62291
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN