The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freeradius | Freeradius | 2.1.1 (including) | 2.1.1 (including) |
Freeradius | Freeradius | 2.1.2 (including) | 2.1.2 (including) |
Freeradius | Freeradius | 2.1.3 (including) | 2.1.3 (including) |
Freeradius | Freeradius | 2.1.4 (including) | 2.1.4 (including) |
Freeradius | Freeradius | 2.1.6 (including) | 2.1.6 (including) |
Freeradius | Freeradius | 2.1.7 (including) | 2.1.7 (including) |
Freeradius | Freeradius | 3.0.0 (including) | 3.0.0 (including) |
Freeradius | Freeradius | 3.0.1 (including) | 3.0.1 (including) |
Freeradius | Freeradius | 3.0.2 (including) | 3.0.2 (including) |
Freeradius | Freeradius | 3.0.3 (including) | 3.0.3 (including) |
Freeradius | Freeradius | 3.0.4 (including) | 3.0.4 (including) |
Freeradius | Freeradius | 3.0.5 (including) | 3.0.5 (including) |
Freeradius | Freeradius | 3.0.6 (including) | 3.0.6 (including) |
Freeradius | Freeradius | 3.0.7 (including) | 3.0.7 (including) |
Freeradius | Freeradius | 3.0.8 (including) | 3.0.8 (including) |
Freeradius | Freeradius | 3.0.9 (including) | 3.0.9 (including) |
Freeradius | Freeradius | 3.1.0 (including) | 3.1.0 (including) |
Freeradius | Freeradius | 3.1.1 (including) | 3.1.1 (including) |
Freeradius | Freeradius | 3.1.2 (including) | 3.1.2 (including) |
Freeradius | Freeradius | 3.1.3 (including) | 3.1.3 (including) |
Freeradius | Freeradius | 4.0.0 (including) | 4.0.0 (including) |
Red Hat Enterprise Linux 7 | RedHat | freeradius-0:3.0.4-8.el7_3 | * |
Freeradius | Ubuntu | upstream | * |
Freeradius | Ubuntu | zesty | * |