Vulnerabilities > Freeradius > Critical

DATE CVE VULNERABILITY TITLE RISK
2019-04-22 CVE-2019-11235 Insufficient Verification of Data Authenticity vulnerability in multiple products
FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.
network
low complexity
freeradius fedoraproject redhat canonical opensuse CWE-345
critical
9.8
2019-04-22 CVE-2019-11234 Improper Authentication vulnerability in multiple products
FreeRADIUS before 3.0.19 does not prevent use of reflection for authentication spoofing, aka a "Dragonblood" issue, a similar issue to CVE-2019-9497.
network
low complexity
freeradius fedoraproject redhat canonical CWE-287
critical
9.8
2017-07-17 CVE-2017-10984 Out-of-bounds Write vulnerability in Freeradius
An FR-GV-301 issue in FreeRADIUS 3.x before 3.0.15 allows "Write overflow in data2vp_wimax()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
network
low complexity
freeradius CWE-787
critical
9.8
2017-07-17 CVE-2017-10979 Out-of-bounds Write vulnerability in Freeradius
An FR-GV-202 issue in FreeRADIUS 2.x before 2.2.10 allows "Write overflow in rad_coalesce()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
network
low complexity
freeradius CWE-787
critical
9.8
2017-05-29 CVE-2017-9148 Improper Authentication vulnerability in Freeradius
The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
network
low complexity
freeradius CWE-287
critical
9.8