First published: Tue Mar 30 2010(Updated: )
The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote attackers to obtain network connectivity via a crafted RADIUS Access Request message.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X Server | =10.6.1 | |
Apple Mac OS X Server | =10.6.2 | |
macOS Yosemite | =10.6.1 | |
Apple Mac OS X Server | =10.6.0 | |
macOS Yosemite | =10.6.0 | |
macOS Yosemite | =10.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0524 is classified as a high severity vulnerability.
To mitigate CVE-2010-0524, update your FreeRADIUS server to the latest version or modify the default configuration to restrict EAP-TLS authenticated connections.
CVE-2010-0524 affects Apple Mac OS X Server versions 10.6.0, 10.6.1, and 10.6.2.
The impact of CVE-2010-0524 allows remote attackers to gain unauthorized network access using crafted RADIUS Access Request messages.
Yes, configuring the FreeRADIUS server to require specific client certificates can serve as a temporary workaround for CVE-2010-0524.