Browse all 6 CVE security advisories affecting strongswan. AI-powered Chinese analysis, POCs, and references for each vulnerability.
strongSwan is an open-source IPsec-based VPN solution primarily used for secure remote access and site-to-site connections. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and configuration handling. While no major public incidents have been widely documented, the project maintains a moderate CVE count with six currently recorded issues. The software's modular architecture and regular updates help mitigate risks, though administrators must remain vigilant about applying patches and hardening configurations to prevent exploitation of known weaknesses in its IKE daemon and control interface.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-25998 | strongMan vulnerable to private credential recovery due to key and counter reuse — strongManCWE-323 | 5.3 | - | 2026-02-19 |
This page lists every published CVE security advisory associated with strongswan. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.