First published: Mon May 29 2017(Updated: )
The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/freeradius | <3.0.14 | 3.0.14 |
FreeRADIUS FreeRADIUS | =2.1.1 | |
FreeRADIUS FreeRADIUS | =2.1.2 | |
FreeRADIUS FreeRADIUS | =2.1.3 | |
FreeRADIUS FreeRADIUS | =2.1.4 | |
FreeRADIUS FreeRADIUS | =2.1.6 | |
FreeRADIUS FreeRADIUS | =2.1.7 | |
FreeRADIUS FreeRADIUS | =3.0.0 | |
FreeRADIUS FreeRADIUS | =3.0.1 | |
FreeRADIUS FreeRADIUS | =3.0.2 | |
FreeRADIUS FreeRADIUS | =3.0.3 | |
FreeRADIUS FreeRADIUS | =3.0.4 | |
FreeRADIUS FreeRADIUS | =3.0.5 | |
FreeRADIUS FreeRADIUS | =3.0.6 | |
FreeRADIUS FreeRADIUS | =3.0.7 | |
FreeRADIUS FreeRADIUS | =3.0.8 | |
FreeRADIUS FreeRADIUS | =3.0.9 | |
FreeRADIUS FreeRADIUS | =3.1.0 | |
FreeRADIUS FreeRADIUS | =3.1.1 | |
FreeRADIUS FreeRADIUS | =3.1.2 | |
FreeRADIUS FreeRADIUS | =3.1.3 | |
FreeRADIUS FreeRADIUS | =4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9148 has a medium severity level due to its ability to bypass authentication.
To mitigate CVE-2017-9148, upgrade FreeRADIUS to version 3.0.14 or later.
FreeRADIUS versions 2.1.1 through 2.1.7, all 3.0.x versions before 3.0.14, and 3.1.x versions before February 4, 2017, are affected.
Yes, remote attackers can exploit CVE-2017-9148 to bypass authentication.
CVE-2017-9148 can facilitate unauthorized access via unauthenticated session resumption.