BSA-2017-342
21400
13 October 2017
23 June 2017
Closed
High
7.4
N/A
CVE-2017-9148
Summary
Security Advisory ID : BSA-2017-342
Component : Freeradius
Revision : 2.0: Interim
The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
Affected ProductsBrocade is investigating its product lines to determine which products may be affected by this vulnerability and the impact on each affected product.
Products Confirmed Not VulnerableBrocade FastIron OS, Brocade NetIron OS, Brocade Services Director, Brocade ServerIron ADX, Brocade SLX-OS, Brocade Virtual ADX, Brocade Virtual Traffic Manager, Brocade Virtual Web Application Firewall, and Brocade Workflow Composer are confirmed not affected by this vulnerability.
WorkaroundThere are no workarounds that address this vulnerability.
Revision History
Version | Change | Date |
---|---|---|
1.0 | Initial Publication | June 23, 2017 |
2.0 | Updated to address ADX & WC | October 13, 2017 |