CVE-2025-62291

high

Description

In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.

References

https://www.strongswan.org/blog/2025/10/27/strongswan-vulnerability-%28cve-2025-62291%29.html

https://lists.debian.org/debian-lts-announce/2025/11/msg00002.html

https://github.com/strongswan/strongswan/releases

https://github.com/strongswan/strongswan/commits/master/src/libcharon/plugins/eap_mschapv2

Details

Source: Mitre, NVD

Published: 2026-01-16

Updated: 2026-01-26

Risk Information

CVSS v2

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.1

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00043