CVE-2025-62291

Publication date 27 October 2025

Last updated 21 January 2026


Ubuntu priority

Cvss 3 Severity Score

8.1 · High

Score breakdown

Description

In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.

Status

Package Ubuntu Release Status
strongswan 25.10 questing
Fixed 6.0.1-6ubuntu4.1
25.04 plucky
Fixed 5.9.13-2ubuntu4.25.04.1
24.04 LTS noble
Fixed 5.9.13-2ubuntu4.24.04.1
22.04 LTS jammy
Fixed 5.9.5-2ubuntu2.4
20.04 LTS focal  
Needs evaluation
18.04 LTS bionic  
Needs evaluation
16.04 LTS xenial  
Needs evaluation
14.04 LTS trusty
Needs evaluation

Severity score breakdown

Parameter Value
Base score 8.1 · High
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-7841-1
    • strongSwan vulnerability
    • 27 October 2025

Other references