MEDIUM · 6.5

CVE-2019-13456

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks info...

Vulnerability Description

In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
FreeradiusFreeradius>= 3.0.0, <= 3.0.19
LinuxLinux Kernel-
RedhatEnterprise Linux7.0
OpensuseLeap15.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-13456?

CVE-2019-13456 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks info...

How severe is CVE-2019-13456?

CVE-2019-13456 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-13456?

Check the references section above for vendor advisories and patch information. Affected products include: Freeradius Freeradius, Linux Linux Kernel, Redhat Enterprise Linux, Opensuse Leap.