FreeRADIUS TLS CVE-2017-9148 Authentication Bypass Vulnerability
Description: The TLS session cache in FreeRADIUS before 3.0.14 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
Impact: An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. FreeRADIUS versions prior to 3.0.14 are vulnerable.
Mitigation: Updates are available. Please see the references for more information.
15 Mar 2020 - Security Advisories & Alerts
- Report Incident▼