Описание
The RADIUS service in Server App in Apple OS X Server before 3.0 selects a fallback X.509 certificate in unspecified circumstances, which might allow man-in-the-middle attackers to hijack RADIUS sessions by leveraging knowledge of the private key that matches this fallback certificate.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.2.2 (включая)
Одно из
cpe:2.3:o:apple:os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:os_x_server:2.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:os_x_server:2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:os_x_server:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:os_x_server:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:os_x_server:2.2.1:*:*:*:*:*:*:*
EPSS
Процентиль: 41%
0.00188
Низкий
6.8 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
The RADIUS service in Server App in Apple OS X Server before 3.0 selects a fallback X.509 certificate in unspecified circumstances, which might allow man-in-the-middle attackers to hijack RADIUS sessions by leveraging knowledge of the private key that matches this fallback certificate.
EPSS
Процентиль: 41%
0.00188
Низкий
6.8 Medium
CVSS2
Дефекты
NVD-CWE-Other