Vulnerability Name:

CVE-2019-10155 (CCN-162652)

Assigned:2019-06-10
Published:2019-06-10
Updated:2020-09-30
Summary:The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.
CVSS v3 Severity:3.1 Low (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)
2.7 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
3.1 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)
2.7 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
3.1 Low (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)
2.7 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-354
Vulnerability Consequences:Data Manipulation
References:Source: MITRE
Type: CNA
CVE-2019-10155

Source: CCN
Type: IBM Security Bulletin 961690 (Netezza Host Management)
Multiple vulnerabilities in Open Source Libreswan affect IBM Netezza Host Management

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:3391

Source: CCN
Type: Red Hat Bugzilla - Bug 1714141
(CVE-2019-10155) - CVE-2019-10155 libreswan: vulnerability in the processing of IKEv1 informational packets due to missing integrity check

Source: CONFIRM
Type: Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155

Source: XF
Type: UNKNOWN
libreswan-cve201910155-weak-security(162652)

Source: CCN
Type: Libreswan Web site
Libreswan VPN software

Source: MISC
Type: Patch, Vendor Advisory
https://libreswan.org/security/CVE-2019-10155/

Source: CCN
Type: Libreswan Web site
CVE-2019-10155: IKEv1 Informational exchange integrity check failure

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2019-1bd9cfb718

Source: FEDORA
Type: Release Notes, Third Party Advisory
FEDORA-2019-f7fb531958

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2019-10155

Vulnerable Configuration:Configuration 1:
  • cpe:/a:libreswan:libreswan:*:*:*:*:*:*:*:* (Version < 3.29)
  • OR cpe:/a:strongswan:strongswan:*:*:*:*:*:*:*:* (Version < 5.0.0)
  • OR cpe:/a:xelerance:openswan:*:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:29:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:30:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:strongswan:strongswan:4.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:strongswan:strongswan:4.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:strongswan:strongswan:4.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:strongswan:strongswan:4.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:strongswan:strongswan:4.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:strongswan:strongswan:4.6.4:*:*:*:*:*:*:*
  • OR cpe:/a:libreswan:libreswan:3.27:*:*:*:*:*:*:*
  • OR cpe:/a:libreswan:libreswan:3.28:*:*:*:*:*:*:*
  • OR cpe:/a:openswan:openswan:*:*:*:*:*:*:*:*
  • OR cpe:/a:libreswan:libreswan:3.26:*:*:*:*:*:*:*
  • OR cpe:/a:libreswan:libreswan:3.25:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20193391
    P
    RHSA-2019:3391: libreswan security and bug fix update (Low)
    2019-11-05
    oval:com.ubuntu.cosmic:def:2019101550000000
    V
    CVE-2019-10155 on Ubuntu 18.10 (cosmic) - low.
    2019-06-12
    oval:com.ubuntu.bionic:def:2019101550000000
    V
    CVE-2019-10155 on Ubuntu 18.04 LTS (bionic) - low.
    2019-06-12
    oval:com.ubuntu.disco:def:2019101550000000
    V
    CVE-2019-10155 on Ubuntu 19.04 (disco) - low.
    2019-06-12
    BACK
    libreswan libreswan *
    strongswan strongswan *
    xelerance openswan *
    fedoraproject fedora 29
    fedoraproject fedora 30
    redhat enterprise linux 8.0
    strongswan strongswan 4.3.4
    strongswan strongswan 4.3.5
    strongswan strongswan 4.3.6
    strongswan strongswan 4.4.0
    strongswan strongswan 4.4.1
    strongswan strongswan 4.6.4
    libreswan libreswan 3.27
    libreswan libreswan 3.28
    openswan openswan *
    libreswan libreswan 3.26
    libreswan libreswan 3.25