CVE-2023-41913
strongSwan vulnerability analysis and mitigation

Overview

CVE-2023-41913 is a critical buffer overflow vulnerability discovered in strongSwan versions 5.3.0 through 5.9.11. The vulnerability affects the charon-tkm component, which is the TKM-backed version of the charon IKE daemon. It was discovered by Florian Picca and publicly disclosed on November 20, 2023. The vulnerability has received a CVSS v3.1 base score of 9.8 (Critical) (NVD, Vendor Advisory).

Technical details

The vulnerability stems from an unchecked memcpy() operation in the charon-tkm component when handling Diffie-Hellman public values. The issue arose from changes made in version 5.3.0, where the responsibility for verifying public DH values was shifted to the DH implementations. The charon-tkm implementation failed to implement proper length checking, allowing any public DH value sent by a peer to be copied into a fixed-size 512-byte buffer on the stack. The length is only limited by the maximum length for accepted IKE messages, which defaults to 10,000 bytes (Vendor Advisory).

Impact

Successful exploitation of this vulnerability could lead to buffer overflow and potential remote code execution via a crafted IKESAINIT message. The attack can be performed without authentication, making it particularly severe. The vulnerability could result in disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS) (NetApp Advisory).

Mitigation and workarounds

The vulnerability has been fixed in strongSwan version 5.9.12. For older versions, patches are available that fix the vulnerability. Systems not using charon-tkm as the IKE daemon are not vulnerable. Additionally, the tkm-multi-ke branch, which will be part of strongSwan 6, is not affected by this vulnerability (Vendor Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management