CVE-2021-41990
high-risk
Published 2021-10-18
The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.
Do I need to act?
~
1.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Strongswan
6Gk6108-4Am00-2Ba2 Firmware
6Gk6108-4Am00-2Da2 Firmware
6Gk5804-0Ap00-2Aa2 Firmware
6Gk5812-1Aa00-2Aa2 Firmware
6Gk5812-1Ba00-2Aa2 Firmware
6Gk5816-1Aa00-2Aa2 Firmware
6Gk5816-1Ba00-2Aa2 Firmware
6Gk5826-2Ab00-2Ab2 Firmware
6Gk5874-2Aa00-2Aa2 Firmware
6Gk5874-3Aa00-2Aa2 Firmware
6Gk5876-3Aa02-2Ba2 Firmware
6Gk5876-3Aa02-2Ea2 Firmware
6Gk5876-4Aa00-2Ba2 Firmware
6Gk5876-4Aa00-2Da2 Firmware
Affected Vendors
References (14)
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf
Third Party Advisory
https://www.debian.org/security/2021/dsa-4989
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf
Third Party Advisory
https://www.debian.org/security/2021/dsa-4989
51
/ 100
high-risk
Severity
26/34 · High
Exploitability
4/34 · Minimal
Exposure
21/34 · High