Get a Pentest and security assessment of your IT network.

News

FreeRADIUS allows hackers to log in without credentials

The security researcher Stefan Winter has discovered a TLS resumption authentication bypass in FreeRADIUS, the worlds most popular RADIUS Server. The flaw, tracked as CVE-2017-9148, resides in the TTLS and PEAP implementations that skip inner authentication when handles a resumed TLS connection. The server must never allow resumption of a TLS session until its initial connection gets to the point where inner authentication has been finished successfully. All versions affected by the flaw need to upgrade to the version 3.0.14 that fixed the issue.”]

Source: https://securityaffairs.co/wordpress/59553/hacking/freeradius-tls-resumption-authentication-bypass.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Thousands of Magento websites compromised to serve malware

News

Facebook Bug #4: Password Reset Vulnerability Found in www.facebook.com