Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5qp2-wwm4-h7fm

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x before 1.0.6, openswan 2.x before 2.1.4, and strongSwan before 2.1.3, allows remote attackers to authenticate using spoofed PKCS#7 certificates in which a self-signed certificate identifies an alternate Certificate Authority (CA) and spoofed issuer and subject.

FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x before 1.0.6, openswan 2.x before 2.1.4, and strongSwan before 2.1.3, allows remote attackers to authenticate using spoofed PKCS#7 certificates in which a self-signed certificate identifies an alternate Certificate Authority (CA) and spoofed issuer and subject.

EPSS

Процентиль: 68%
0.00579
Низкий

Связанные уязвимости

nvd
почти 21 год назад

FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x before 1.0.6, openswan 2.x before 2.1.4, and strongSwan before 2.1.3, allows remote attackers to authenticate using spoofed PKCS#7 certificates in which a self-signed certificate identifies an alternate Certificate Authority (CA) and spoofed issuer and subject.

debian
почти 21 год назад

FreeS/WAN 1.x and 2.x, and other related products including superfrees ...

EPSS

Процентиль: 68%
0.00579
Низкий