{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2022-4967","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2024-04-19T18:02:23.578Z","datePublished":"2024-05-13T12:09:19.104Z","dateUpdated":"2025-02-13T16:38:39.882Z"},"containers":{"cna":{"affected":[{"packageName":"strongswan","platforms":["Linux"],"product":"strongSwan","repo":"https://github.com/strongswan/strongswan","vendor":"strongSwan","versions":[{"lessThan":"5.9.6","status":"affected","version":"5.9.2","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"Jan Schermer"}],"descriptions":[{"lang":"en","value":"strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). When certificates are used to authenticate clients in TLS-based EAP methods, the IKE or EAP identity supplied by a client is not enforced to be contained in the client's certificate. So clients can authenticate with any trusted certificate and claim an arbitrary IKE/EAP identity as their own. This is problematic if the identity is used to make policy decisions. A fix was released in strongSwan version 5.9.6 in August 2022 (e4b4aabc4996fc61c37deab7858d07bc4d220136)."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-297"}]}],"references":[{"tags":["patch"],"url":"https://github.com/strongswan/strongswan/commit/e4b4aabc4996fc61c37deab7858d07bc4d220136"},{"tags":["vendor-advisory"],"url":"https://www.strongswan.org/blog/2024/05/13/strongswan-vulnerability-(cve-2022-4967).html"},{"tags":["issue-tracking"],"url":"https://www.cve.org/CVERecord?id=CVE-2022-4967"},{"url":"https://security.netapp.com/advisory/ntap-20240614-0006/"}],"providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2024-06-14T13:06:08.293Z"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2022-4967","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-17T13:10:42.421746Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:16:33.158Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:55:46.125Z"},"title":"CVE Program Container","references":[{"tags":["patch","x_transferred"],"url":"https://github.com/strongswan/strongswan/commit/e4b4aabc4996fc61c37deab7858d07bc4d220136"},{"tags":["vendor-advisory","x_transferred"],"url":"https://www.strongswan.org/blog/2024/05/13/strongswan-vulnerability-(cve-2022-4967).html"},{"tags":["issue-tracking","x_transferred"],"url":"https://www.cve.org/CVERecord?id=CVE-2022-4967"},{"url":"https://security.netapp.com/advisory/ntap-20240614-0006/","tags":["x_transferred"]}]}]},"dataVersion":"5.1"}