CVE Vulnerabilities

CVE-2019-10155

Improper Validation of Integrity Check Value

Published: Jun 12, 2019 | Modified: Nov 21, 2024
CVSS 3.x
3.1
LOW
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
CVSS 2.x
3.5 LOW
AV:N/AC:M/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
3.1 LOW
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.

Weakness

The product does not validate or incorrectly validates the integrity check values or “checksums” of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.

Affected Software

NameVendorStart VersionEnd Version
LibreswanLibreswan*3.29 (excluding)
StrongswanStrongswan*5.0.0 (excluding)
OpenswanXelerance**
Red Hat Enterprise Linux 8RedHatlibreswan-0:3.29-6.el8*
LibreswanUbuntubionic*
LibreswanUbuntucosmic*
LibreswanUbuntudevel*
LibreswanUbuntudisco*
LibreswanUbuntueoan*
LibreswanUbuntuesm-apps/bionic*
LibreswanUbuntuesm-apps/focal*
LibreswanUbuntuesm-apps/jammy*
LibreswanUbuntuesm-apps/noble*
LibreswanUbuntufocal*
LibreswanUbuntugroovy*
LibreswanUbuntuhirsute*
LibreswanUbuntuimpish*
LibreswanUbuntujammy*
LibreswanUbuntukinetic*
LibreswanUbuntulunar*
LibreswanUbuntumantic*
LibreswanUbuntunoble*
LibreswanUbuntuoracular*
LibreswanUbuntuplucky*
LibreswanUbuntuquesting*
LibreswanUbuntutrusty*
LibreswanUbuntuupstream*

Potential Mitigations

References