2.9
CVSSv2

CVE-2019-13456

Published: 03/12/2019 Updated: 01/01/2022
CVSS v2 Base Score: 2.9 | Impact Score: 2.9 | Exploitability Score: 5.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 258
Vector: AV:A/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

In FreeRADIUS 3.0 up to and including 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freeradius freeradius

redhat enterprise linux 7.0

redhat enterprise linux 8.0

opensuse leap 15.1

Vendor Advisories

Synopsis Moderate: freeradius security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for freeradius is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CV ...
Synopsis Moderate: freeradius:30 security update Type/Severity Security Advisory: Moderate Topic An update for the freeradius:30 module is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sys ...
It was discovered freeradius does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user (CVE-2019-10143) An information leak was discovered in the ...