CVE Vulnerabilities

CVE-2017-9148

Improper Authentication

Published: May 29, 2017 | Modified: Jan 05, 2018
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Freeradius Freeradius 2.1.1 (including) 2.1.1 (including)
Freeradius Freeradius 2.1.2 (including) 2.1.2 (including)
Freeradius Freeradius 2.1.3 (including) 2.1.3 (including)
Freeradius Freeradius 2.1.4 (including) 2.1.4 (including)
Freeradius Freeradius 2.1.6 (including) 2.1.6 (including)
Freeradius Freeradius 2.1.7 (including) 2.1.7 (including)
Freeradius Freeradius 3.0.0 (including) 3.0.0 (including)
Freeradius Freeradius 3.0.1 (including) 3.0.1 (including)
Freeradius Freeradius 3.0.2 (including) 3.0.2 (including)
Freeradius Freeradius 3.0.3 (including) 3.0.3 (including)
Freeradius Freeradius 3.0.4 (including) 3.0.4 (including)
Freeradius Freeradius 3.0.5 (including) 3.0.5 (including)
Freeradius Freeradius 3.0.6 (including) 3.0.6 (including)
Freeradius Freeradius 3.0.7 (including) 3.0.7 (including)
Freeradius Freeradius 3.0.8 (including) 3.0.8 (including)
Freeradius Freeradius 3.0.9 (including) 3.0.9 (including)
Freeradius Freeradius 3.1.0 (including) 3.1.0 (including)
Freeradius Freeradius 3.1.1 (including) 3.1.1 (including)
Freeradius Freeradius 3.1.2 (including) 3.1.2 (including)
Freeradius Freeradius 3.1.3 (including) 3.1.3 (including)
Freeradius Freeradius 4.0.0 (including) 4.0.0 (including)

Potential Mitigations

References