Lucene search

K
cvelistMitreCVELIST:CVE-2015-8023
HistoryNov 18, 2015 - 4:00 p.m.

CVE-2015-8023

2015-11-1816:00:00
mitre
www.cve.org
3

AI Score

7.5

Confidence

High

EPSS

0.005

Percentile

77.1%

The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.

AI Score

7.5

Confidence

High

EPSS

0.005

Percentile

77.1%