BSA-2017-342

Brocade Fabric OS

2 more products

21400

13 October 2017

23 June 2017

Closed

High

7.4

N/A

CVE-2017-9148

Summary

Security Advisory ID : BSA-2017-342

Component : Freeradius

Revision : 2.0: Interim

The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.

Affected Products

Brocade is investigating its product lines to determine which products may be affected by this vulnerability and the impact on each affected product.

Products Confirmed Not Vulnerable

Brocade FastIron OS, Brocade NetIron OS, Brocade Services Director, Brocade ServerIron ADX, Brocade SLX-OS, Brocade Virtual ADX, Brocade Virtual Traffic Manager, Brocade Virtual Web Application Firewall, and Brocade Workflow Composer are confirmed not affected by this vulnerability.

Workaround

There are no workarounds that address this vulnerability.


Revision History

Version Change Date
1.0 Initial Publication June 23, 2017
2.0 Updated to address ADX & WC October 13, 2017