Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2022-4967
Undergoing Analysis
More InfoOfficial Page
Source-security@ubuntu.com
View Known Exploited Vulnerability (KEV) details
Published At-14 May, 2024 | 11:57
Updated At-22 Aug, 2025 | 15:04

strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). When certificates are used to authenticate clients in TLS-based EAP methods, the IKE or EAP identity supplied by a client is not enforced to be contained in the client's certificate. So clients can authenticate with any trusted certificate and claim an arbitrary IKE/EAP identity as their own. This is problematic if the identity is used to make policy decisions. A fix was released in strongSwan version 5.9.6 in August 2022 (e4b4aabc4996fc61c37deab7858d07bc4d220136).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.7HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CPE Matches

strongswan
strongswan
>>strongswan>>Versions from 5.9.2(inclusive) to 5.9.6(exclusive)
cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/strongswan/strongswan/commit/e4b4aabc4996fc61c37deab7858d07bc4d220136security@ubuntu.com
Patch
https://security.netapp.com/advisory/ntap-20240614-0006/security@ubuntu.com
Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2022-4967security@ubuntu.com
Third Party Advisory
https://www.strongswan.org/blog/2024/05/13/strongswan-vulnerability-(cve-2022-4967).htmlsecurity@ubuntu.com
Mitigation
Vendor Advisory
https://github.com/strongswan/strongswan/commit/e4b4aabc4996fc61c37deab7858d07bc4d220136af854a3a-2127-422b-91ae-364da2661108
Patch
https://security.netapp.com/advisory/ntap-20240614-0006/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2022-4967af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.strongswan.org/blog/2024/05/13/strongswan-vulnerability-(cve-2022-4967).htmlaf854a3a-2127-422b-91ae-364da2661108
Mitigation
Vendor Advisory
Change History
0Changes found

Details not found