CVE-2010-0524

The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote attackers to obtain network connectivity via a crafted RADIUS Access Request message.
Severity
UNKNOWN
AV:N/AC:L/Au:N/C:P/I:P/A:P
Atk. Vector
NETWORK
Atk. Complexity
LOW
Base Score
CVSS 3.x
EPSS Score
Percentile: 76%
VendorProductVersion
applemac_os_x
10.6.0
applemac_os_x
10.6.1
applemac_os_x
10.6.2
applemac_os_x_server
10.6.0
applemac_os_x_server
10.6.1
applemac_os_x_server
10.6.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freeradius
bullseye
3.0.21+dfsg-2.2+deb11u1
fixed
bookworm
3.2.1+dfsg-4+deb12u1
fixed
sid
3.2.5+dfsg-3
fixed
trixie
3.2.5+dfsg-3
fixed
Common Weakness Enumeration