Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-9148

Опубликовано: 29 мая 2017
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:freeradius:freeradius:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:4.0.0:*:*:*:*:*:*:*

EPSS

Процентиль: 78%
0.01209
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.

CVSS3: 7.4
redhat
больше 8 лет назад

The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.

CVSS3: 9.8
debian
больше 8 лет назад

The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before ...

suse-cvrf
больше 8 лет назад

Security update for freeradius-server

suse-cvrf
больше 8 лет назад

Security update for freeradius-server

EPSS

Процентиль: 78%
0.01209
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-287