FreeRADIUS TLS CVE-2017-9148 Authentication Bypass Vulnerability
by CIRT Team
Description: The TLS session cache in FreeRADIUS before 3.0.14 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
Impact: An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. FreeRADIUS versions prior to 3.0.14 are vulnerable.
Mitigation: Updates are available. Please see the references for more information.
Reference URL’s:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9148
- http://www.securityfocus.com/bid/98734/info
- http://freeradius.org/security.html
- https://access.redhat.com/security/cve/cve-2017-9148
- https://security-tracker.debian.org/tracker/CVE-2017-9148
Recommended Posts
Emerging Threat_Stealer Malware (Lumma C2) Campaign with fake CAPTCHA pages
08 Oct 2024 - Security Advisories & Alerts