This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
strongSwan developers report :
Remote attackers are able to bypass authentication by rekeying an
IKE_SA during (1) initiation or (2) re-authentication, which triggers
the IKE_SA state to be set to established.
Only installations that actively initiate or re-authenticate IKEv2
IKE_SAs are affected.
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 6.4