VYPR
Critical severity9.8NVD Advisory· Published May 29, 2017· Updated May 13, 2026

CVE-2017-9148

CVE-2017-9148

Description

The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.

Affected products

21
  • cpe:2.3:a:freeradius:freeradius:2.1.1:*:*:*:*:*:*:*+ 20 more
    • cpe:2.3:a:freeradius:freeradius:2.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:2.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:2.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:2.1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:2.1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:2.1.7:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.0.9:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:3.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:freeradius:freeradius:4.0.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.