CVE Vulnerabilities

CVE-2018-16152

Improper Verification of Cryptographic Signature

Published: Sep 26, 2018 | Modified: Dec 03, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
5.6 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
StrongswanStrongswan4.0.0 (including)4.6.4 (including)
StrongswanStrongswan5.0.0 (including)5.7.0 (excluding)
StrongswanUbuntubionic*
StrongswanUbuntudevel*
StrongswanUbuntuesm-infra-legacy/trusty*
StrongswanUbuntuesm-infra/bionic*
StrongswanUbuntuesm-infra/xenial*
StrongswanUbuntutrusty*
StrongswanUbuntutrusty/esm*
StrongswanUbuntuxenial*

References