FreeRADIUS TLS CVE-2017-9148 Authentication Bypass Vulnerability
Description: The TLS session cache in FreeRADIUS before 3.0.14 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
Impact: An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. FreeRADIUS versions prior to 3.0.14 are vulnerable.
Mitigation: Updates are available. Please see the references for more information.
Reference URL’s:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9148
- http://www.securityfocus.com/bid/98734/info
- http://freeradius.org/security.html
- https://access.redhat.com/security/cve/cve-2017-9148
- https://security-tracker.debian.org/tracker/CVE-2017-9148
Recommended Posts
Multiple Vulnerabilities in SolarWinds Orion and ServU-FTP Could Allow for Remote Code Execution
01 Mar 2021 - Security Advisories & Alerts