vulnerability
Oracle Linux: CVE-2017-9148: ELSA-2017-1581: freeradius security update (IMPORTANT)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | May 8, 2017 | Jun 29, 2017 | Dec 3, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 8, 2017
Added
Jun 29, 2017
Modified
Dec 3, 2025
Description
The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
An authentication bypass flaw was found in the way the EAP module in FreeRADIUS handled TLS session resumption. A remote unauthenticated attacker could potentially use this flaw to bypass the inner authentication check in FreeRADIUS by resuming an older unauthenticated TLS session.
An authentication bypass flaw was found in the way the EAP module in FreeRADIUS handled TLS session resumption. A remote unauthenticated attacker could potentially use this flaw to bypass the inner authentication check in FreeRADIUS by resuming an older unauthenticated TLS session.
Solutions
oracle-linux-upgrade-freeradiusoracle-linux-upgrade-freeradius-develoracle-linux-upgrade-freeradius-docoracle-linux-upgrade-freeradius-krb5oracle-linux-upgrade-freeradius-ldaporacle-linux-upgrade-freeradius-mysqloracle-linux-upgrade-freeradius-perloracle-linux-upgrade-freeradius-postgresqloracle-linux-upgrade-freeradius-pythonoracle-linux-upgrade-freeradius-sqliteoracle-linux-upgrade-freeradius-unixodbcoracle-linux-upgrade-freeradius-utils
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.