Lucene search

K
redhatcveRedhat.comRH:CVE-2017-9148
HistoryMay 30, 2017 - 8:20 a.m.

CVE-2017-9148

2017-05-3008:20:48
redhat.com
access.redhat.com
7

0.007 Low

EPSS

Percentile

80.3%

An authentication bypass flaw was found in the way the EAP module in FreeRADIUS handled TLS session resumption. A remote unauthenticated attacker could potentially use this flaw to bypass the inner authentication check in FreeRADIUS by resuming an older unauthenticated TLS session.

Mitigation

Disable TLS session caching in FreeRADIUS by setting "enable = no" in the cache subsection of EAP module settings, which are in /etc/raddb/mods-available/eap file.