FreeRADIUS TLS CVE-2017-9148 Authentication Bypass Vulnerability
by CIRT Team
Description: The TLS session cache in FreeRADIUS before 3.0.14 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
Impact: An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. FreeRADIUS versions prior to 3.0.14 are vulnerable.
Mitigation: Updates are available. Please see the references for more information.
Reference URL’s:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9148
- http://www.securityfocus.com/bid/98734/info
- http://freeradius.org/security.html
- https://access.redhat.com/security/cve/cve-2017-9148
- https://security-tracker.debian.org/tracker/CVE-2017-9148
Recommended Posts
Active Exploitation of Critical F5 BIG – IP Vulnerability (CVE–2023-46747) Uncovered in Bangladesh
06 Nov 2024 - Security Advisories & Alerts