CVE-2017-9148

The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freeradius:freeradius:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:4.0.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-05-29 17:29

Updated : 2023-12-10 12:15


NVD link : CVE-2017-9148

Mitre link : CVE-2017-9148

CVE.ORG link : CVE-2017-9148


JSON object : View

Products Affected

freeradius

  • freeradius
CWE
CWE-287

Improper Authentication