The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
2017-05-29T17:29:00.200
2025-04-20T01:37:25.860
Deferred
CVSSv3.0: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | freeradius | freeradius | 2.1.1 | Yes |
Application | freeradius | freeradius | 2.1.2 | Yes |
Application | freeradius | freeradius | 2.1.3 | Yes |
Application | freeradius | freeradius | 2.1.4 | Yes |
Application | freeradius | freeradius | 2.1.6 | Yes |
Application | freeradius | freeradius | 2.1.7 | Yes |
Application | freeradius | freeradius | 3.0.0 | Yes |
Application | freeradius | freeradius | 3.0.1 | Yes |
Application | freeradius | freeradius | 3.0.2 | Yes |
Application | freeradius | freeradius | 3.0.3 | Yes |
Application | freeradius | freeradius | 3.0.4 | Yes |
Application | freeradius | freeradius | 3.0.5 | Yes |
Application | freeradius | freeradius | 3.0.6 | Yes |
Application | freeradius | freeradius | 3.0.7 | Yes |
Application | freeradius | freeradius | 3.0.8 | Yes |
Application | freeradius | freeradius | 3.0.9 | Yes |
Application | freeradius | freeradius | 3.1.0 | Yes |
Application | freeradius | freeradius | 3.1.1 | Yes |
Application | freeradius | freeradius | 3.1.2 | Yes |
Application | freeradius | freeradius | 3.1.3 | Yes |
Application | freeradius | freeradius | 4.0.0 | Yes |