HomeFreeradiusCVE-2011-2701

CVE-2011-2701

UNKNOWN
5.8CVSS
Published: 2011-08-04
Updated: 2025-04-11
AI Analysis

Description

The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.

CVSS Metrics

Vector
AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector
network
Access Cmplx
medium
Auth
none
Confidentiality
partial
Integrity
partial
Availability
none
Weaknesses
CWE-287

Metadata

Primary Vendor
FREERADIUS
Published
8/4/2011
Last Modified
4/11/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

freeradius : freeradius

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2011-2701 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com