CVE-2023-26463
strongSwan vulnerability analysis and mitigation

Overview

CVE-2023-26463 affects strongSwan versions 5.9.8 and 5.9.9, involving a certificate verification vulnerability in TLS-based EAP methods. The vulnerability was discovered and disclosed on March 2, 2023, and affects strongSwan's implementation of certificate verification, potentially allowing remote code execution. The issue specifically impacts servers that load plugins implementing TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC) (Strongswan Blog).

Technical details

The vulnerability stems from incorrect access control followed by an expired pointer dereference. The technical issue involves the TLS implementation in libtls incorrectly treating the public key from the peer's certificate as trusted, even when the certificate cannot be verified successfully. Additionally, the public key lacks the correct reference count, leading to a dereference of an expired pointer. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD, Strongswan Blog).

Impact

The vulnerability can lead to multiple severe impacts including denial of service, information disclosure, and potential remote code execution. When exploited, it allows authentication bypass and can cause a segmentation fault. Depending on memory allocation conditions, the pointer dereference could potentially lead to code execution under an attacker's control (Strongswan Blog, NetApp Advisory).

Mitigation and workarounds

The vulnerability is fixed in strongSwan version 5.9.10. For servers, mitigation involves ensuring they don't load plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, EAP-TNC) or not configuring them as remote authentication methods. The eap-dynamic plugin should not be used as it allows clients to select their preferred EAP method. Clients are not vulnerable if they don't load plugins for TLS-based EAP methods or don't configure such methods as their authentication method (Strongswan Blog).

Additional resources


SourceThis report was generated using AI

Related strongSwan vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-41913CRITICAL9.8
  • strongSwanstrongSwan
  • strongswan-tnc-imcvs
NoYesDec 07, 2023
CVE-2023-26463CRITICAL9.8
  • strongSwanstrongSwan
  • strongswan
NoYesApr 15, 2023
CVE-2025-62291HIGH8.1
  • strongSwanstrongSwan
  • strongswan
NoYesJan 16, 2026
CVE-2022-40617HIGH7.5
  • strongSwanstrongSwan
  • strongswan
NoYesOct 31, 2022
CVE-2022-4967MEDIUM6.5
  • strongSwanstrongSwan
  • cpe:2.3:a:strongswan:strongswan
NoYesMay 14, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management