Unrated severityNVD Advisory· Published Nov 18, 2015· Updated May 6, 2026
CVE-2015-8023
CVE-2015-8023
Description
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.opensuse.org/opensuse-security-announce/2015-12/msg00025.htmlnvd
- lists.opensuse.org/opensuse-updates/2015-11/msg00139.htmlnvd
- www.debian.org/security/2015/dsa-3398nvd
- www.securityfocus.com/bid/84947nvd
- www.ubuntu.com/usn/USN-2811-1nvd
- www.strongswan.org/blog/2015/11/16/strongswan-vulnerability-%28cve-2015-8023%29.htmlnvd
News mentions
0No linked articles in our index yet.