CVE-2022-4967

7.7 HIGH
Published: May 14, 2024 Modified: November 06, 2025

Description

strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). When certificates are used to authenticate clients in TLS-based EAP methods, the IKE or EAP identity supplied by a client is not enforced to be contained in the client's certificate. So clients can authenticate with any trusted certificate and claim an arbitrary IKE/EAP identity as their own. This is problematic if the identity is used to make policy decisions. A fix was released in strongSwan version 5.9.6 in August 2022 (e4b4aabc4996fc61c37deab7858d07bc4d220136).

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://security.netapp.com/advisory/ntap-20240614-0006/
Source: security@ubuntu.com
Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2022-4967
Source: security@ubuntu.com
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240614-0006/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2022-4967
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.strongswan.org/blog/2024/05/13/strongswan-vulnerability-(cve-2022-4967).html
Source: af854a3a-2127-422b-91ae-364da2661108
Mitigation Vendor Advisory

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.7 / 10.0
EPSS (Exploit Probability)
0.0%
14th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

strongswan