Home

Description

In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.

PUBLISHED Reserved 2025-10-10 | Published 2026-01-16 | Updated 2026-01-16 | Assigner mitre




HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-191 Integer Underflow (Wrap or Wraparound)

Product status

Default status
unaffected

4.2.12 (semver) before 6.0.3
affected

References

lists.debian.org/debian-lts-announce/2025/11/msg00002.html

github.com/strongswan/strongswan/releases

github.com/...mits/master/src/libcharon/plugins/eap_mschapv2

www.strongswan.org/...an-vulnerability-(cve-2025-62291).html

cve.org (CVE-2025-62291)

nvd.nist.gov (CVE-2025-62291)

Download JSON