Lucene search

K
redosRedosROS-20240402-14
HistoryApr 02, 2024 - 12:00 a.m.

ROS-20240402-14

2024-04-0200:00:00
redos.red-soft.ru
12
vulnerability
ipsec strongswan
vpn
key exchange
tkmv2
trusted key manager
exploitation
remote execution
arbitrary code
unix

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

72.8%

Vulnerability of a VPN packet based on IPSec strongSwan protocol is caused by a bug in the charon-tkm process with the
key exchange (IKE) protocol implementation based on TKMv2 (Trusted Key Manager). Exploitation of the vulnerability
could allow an attacker acting remotely to execute arbitrary code

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64strongswan<= 5.9.10-2UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

72.8%