strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control) that doesn't properly respond but (for example) just does nothing after the initial TCP handshake, or sends an excessive amount of application data.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "3.11.1"
},
{
"fixed": "3.11.20"
},
{
"introduced": "4.3.1"
},
{
"fixed": "4.3.15"
}
],
"cpe": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "14.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "16.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "18.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "20.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "22.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.0"
}
],
"cpe": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "11.0"
}
],
"cpe": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "37"
}
],
"cpe": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
}
]
}{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "5.9.8"
},
{
"introduced": "4.5.1"
},
{
"fixed": "4.6.0"
}
],
"cpe": [
"cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*",
"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*"
]
}[
{
"target": {
"function": "main",
"file": "src/scepclient/scepclient.c"
},
"source": "https://github.com/strongswan/strongswan/commit/72a1b2e3089ca3814a7741fb162620b7215e5807",
"deprecated": false,
"digest": {
"length": 15429.0,
"function_hash": "329727258632254325996888576331228235748"
},
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2022-40617-104497a8"
},
{
"target": {
"file": "src/scepclient/scepclient.c"
},
"source": "https://github.com/strongswan/strongswan/commit/72a1b2e3089ca3814a7741fb162620b7215e5807",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"318372487100592807782603248850652055128",
"191378964250929219076766640186664879089",
"227279917454857959696357758482079942948",
"289397897288950579549925744982889855308",
"330694031509858495146969201303390442159",
"308924465538952239986027488632480257694",
"3515372627853317527205167152503058613",
"195676375774350054415641798506347782068",
"282725140310445569506232913983604477491",
"82769793694550156531495484439774477454",
"155781169334603343811059365732274395351"
]
},
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2022-40617-c66752c8"
}
]
"2026-04-12T05:06:35Z"
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-40617.json"