CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
80.3%
Severity: High
Date : 2017-06-02
CVE-ID : CVE-2017-9148
Package : freeradius
Type : authentication bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-281
The package freeradius before version 3.0.14-3 is vulnerable to
authentication bypass.
Upgrade to 3.0.14-3.
The problem has been fixed upstream in version 3.0.14.
None.
A security issue has been found in FreeRADIUS < 3.0.14. The
implementation of TTLS and PEAP in FreeRADIUS skips inner
authentication when it handles a resumed TLS connection. This is a
feature but there is a critical catch: the server must never allow
resumption of a TLS session until its initial connection gets to the
point where inner authentication has been finished successfully.
Unfortunately, affected versions of FreeRADIUS fail to reliably prevent
resumption of unauthenticated sessions unless the TLS session cache is
disabled completely and allow an attacker (e.g. a malicious supplicant)
to elicit EAP Success without sending any valid credentials.
A remote user can bypass authentication by starting then resuming an
unauthenticated TLS session.
http://freeradius.org/press/index.html#3.0.14
http://seclists.org/oss-sec/2017/q2/342
https://security.archlinux.org/CVE-2017-9148
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | freeradius | < 3.0.14-3 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
80.3%