Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3652: IKEv1 with default AH/ESP configuration can cause libreswan to abort and restart in The Libreswan Project (www.libreswan.org) libreswan

0
Medium
VulnerabilityCVE-2024-3652cvecve-2024-3652
Published: Thu Apr 11 2024 (04/11/2024, 01:32:13 UTC)
Source: CVE Database V5
Vendor/Project: The Libreswan Project (www.libreswan.org)
Product: libreswan

Description

CVE-2024-3652 is a vulnerability in Libreswan version 3. 22 affecting IKEv1 connections when the esp= line is not specified. The issue arises because the default proposal handler crashes upon receiving a peer request for AES-GMAC, causing an assertion failure that leads to Libreswan aborting and restarting. This vulnerability does not affect IKEv2 connections. The flaw impacts availability by causing service interruptions but does not compromise confidentiality or integrity. Exploitation requires network access and privileges to initiate IKEv1 negotiations, but no user interaction is needed. There are currently no known exploits in the wild, and no patches have been published yet. Organizations relying on Libreswan for VPN services using IKEv1 should be aware of potential service disruptions and consider mitigation steps to prevent crashes. The CVSS score is 6. 5 (medium severity), reflecting the moderate impact and ease of exploitation under certain conditions.

AI-Powered Analysis

AILast updated: 02/27/2026, 15:42:31 UTC

Technical Analysis

CVE-2024-3652 is a medium-severity vulnerability identified in Libreswan version 3.22, specifically affecting the handling of IKEv1 VPN connections. Libreswan is an open-source implementation of IPsec used widely for secure VPN tunnels. The vulnerability occurs when IKEv1 connections are established without explicitly specifying the esp= configuration line. In such cases, if the peer requests the AES-GMAC algorithm for authentication, Libreswan's default proposal handler triggers an assertion failure. This failure causes the Libreswan process to abort unexpectedly and restart, disrupting VPN service availability. The root cause is linked to improper handling of default AH/ESP configurations in the IKEv1 negotiation phase. Notably, IKEv2 connections remain unaffected by this issue. The vulnerability is classified under CWE-404 (Improper Resource Shutdown or Release), indicating that the software does not gracefully handle unexpected negotiation parameters, leading to a crash. The CVSS v3.1 base score is 6.5, reflecting network attack vector, low attack complexity, requiring privileges, no user interaction, unchanged scope, and impact limited to availability. No patches or fixes have been publicly released at the time of disclosure, and no known exploits have been reported in the wild. This vulnerability primarily threatens the stability and reliability of VPN services relying on Libreswan IKEv1 configurations, potentially causing denial of service through repeated process restarts.

Potential Impact

The primary impact of CVE-2024-3652 is on the availability of VPN services using Libreswan with IKEv1 configurations. Organizations relying on Libreswan 3.22 for secure IPsec tunnels may experience unexpected service interruptions due to the process abort and restart triggered by the vulnerability. This can lead to denial of service conditions, disrupting secure communications, remote access, and site-to-site VPN connectivity. Although confidentiality and integrity of data are not directly compromised, the loss of VPN availability can affect business operations, especially for organizations dependent on continuous secure network access. The vulnerability requires an attacker to initiate IKEv1 negotiations with a specially crafted proposal requesting AES-GMAC, which is feasible for network-level adversaries with some privileges. The lack of impact on IKEv2 reduces the overall risk for environments that have migrated to newer protocols. However, legacy systems and configurations still using IKEv1 are at risk. The absence of known exploits limits immediate widespread impact, but the vulnerability could be leveraged for targeted denial of service attacks against critical infrastructure, government networks, and enterprises using Libreswan-based VPNs.

Mitigation Recommendations

To mitigate CVE-2024-3652, organizations should first audit their Libreswan deployments to identify usage of version 3.22 and reliance on IKEv1 with default AH/ESP configurations. Where possible, explicitly specify the esp= line in IKEv1 configurations to avoid triggering the default proposal handler that causes the crash. Transitioning VPN configurations from IKEv1 to IKEv2 is strongly recommended, as IKEv2 is not affected by this vulnerability and offers improved security and stability. Monitor Libreswan project communications for forthcoming patches or updates addressing this issue and apply them promptly once available. In the interim, consider implementing network-level controls to restrict or monitor IKEv1 negotiation attempts from untrusted sources to reduce exposure. Additionally, configure robust logging and alerting on Libreswan service restarts to detect potential exploitation attempts. For critical environments, deploying redundant VPN gateways or failover mechanisms can help maintain availability during potential disruptions. Avoid using AES-GMAC in IKEv1 proposals until a fix is released or the configuration is hardened.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
libreswan
Date Reserved
2024-04-11T01:28:41.331Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1b7a632ffcdb8a23ccfc8

Added to database: 2/27/2026, 3:26:30 PM

Last enriched: 2/27/2026, 3:42:31 PM

Last updated: 2/27/2026, 5:55:06 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses