CVE Vulnerabilities

CVE-2017-9148

Improper Authentication

Published: May 29, 2017 | Modified: Jan 05, 2018
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.4 IMPORTANT
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM

The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Freeradius Freeradius 2.1.1 (including) 2.1.1 (including)
Freeradius Freeradius 2.1.2 (including) 2.1.2 (including)
Freeradius Freeradius 2.1.3 (including) 2.1.3 (including)
Freeradius Freeradius 2.1.4 (including) 2.1.4 (including)
Freeradius Freeradius 2.1.6 (including) 2.1.6 (including)
Freeradius Freeradius 2.1.7 (including) 2.1.7 (including)
Freeradius Freeradius 3.0.0 (including) 3.0.0 (including)
Freeradius Freeradius 3.0.1 (including) 3.0.1 (including)
Freeradius Freeradius 3.0.2 (including) 3.0.2 (including)
Freeradius Freeradius 3.0.3 (including) 3.0.3 (including)
Freeradius Freeradius 3.0.4 (including) 3.0.4 (including)
Freeradius Freeradius 3.0.5 (including) 3.0.5 (including)
Freeradius Freeradius 3.0.6 (including) 3.0.6 (including)
Freeradius Freeradius 3.0.7 (including) 3.0.7 (including)
Freeradius Freeradius 3.0.8 (including) 3.0.8 (including)
Freeradius Freeradius 3.0.9 (including) 3.0.9 (including)
Freeradius Freeradius 3.1.0 (including) 3.1.0 (including)
Freeradius Freeradius 3.1.1 (including) 3.1.1 (including)
Freeradius Freeradius 3.1.2 (including) 3.1.2 (including)
Freeradius Freeradius 3.1.3 (including) 3.1.3 (including)
Freeradius Freeradius 4.0.0 (including) 4.0.0 (including)
Red Hat Enterprise Linux 7 RedHat freeradius-0:3.0.4-8.el7_3 *
Freeradius Ubuntu upstream *
Freeradius Ubuntu zesty *

Potential Mitigations

References