vulnerability
FreeBSD: VID-673dce46-46d0-11e7-a539-0050569f7e80 (CVE-2017-9148): FreeRADIUS -- TLS resumption authentication bypass
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jun 1, 2017 | Jun 1, 2017 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jun 1, 2017
Added
Jun 1, 2017
Modified
Dec 10, 2025
Description
Stefan Winter reports: The TLS session cache in FreeRADIUS before 3.0.14 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
Solutions
freebsd-upgrade-package-freeradiusfreebsd-upgrade-package-freeradius2freebsd-upgrade-package-freeradius3
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.