5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.007 Low
EPSS
Percentile
80.5%
The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | freeradius | < 3.2.1+dfsg-4+deb12u1 | freeradius_3.2.1+dfsg-4+deb12u1_all.deb |
Debian | 11 | all | freeradius | < 3.0.21+dfsg-2.2+deb11u1 | freeradius_3.0.21+dfsg-2.2+deb11u1_all.deb |
Debian | 10 | all | freeradius | < 3.0.17+dfsg-1.1+deb10u1 | freeradius_3.0.17+dfsg-1.1+deb10u1_all.deb |
Debian | 999 | all | freeradius | < 3.2.3+dfsg-2 | freeradius_3.2.3+dfsg-2_all.deb |
Debian | 13 | all | freeradius | < 3.2.3+dfsg-2 | freeradius_3.2.3+dfsg-2_all.deb |