Description
The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-977-1 | freeradius security update |
EUVD |
EUVD-2017-18086 | The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS. |
Ubuntu USN |
USN-3316-1 | FreeRADIUS vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T16:55:22.379Z
Reserved: 2017-05-22T00:00:00.000Z
Link: CVE-2017-9148
No data.
Status : Modified
Published: 2017-05-29T17:29:00.200
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-9148
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN