CVE-2021-32642

Missing input validation in dynamic discovery example scripts.

Description

radsecproxy is a generic RADIUS proxy that supports both UDP and TLS (RadSec) RADIUS transports. Missing input validation in radsecproxy's `naptr-eduroam.sh` and `radsec-dynsrv.sh` scripts can lead to configuration injection via crafted radsec peer discovery DNS records. Users are subject to Information disclosure, Denial of Service, Redirection of Radius connection to a non-authenticated server leading to non-authenticated network access. Updated example scripts are available in the master branch and 1.9 release. Note that the scripts are not part of the installation package and are not updated automatically. If you are using the examples, you have to update them manually. The dyndisc scripts work independently of the radsecproxy code. The updated scripts can be used with any version of radsecproxy.

Categories

7.0
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 1.04% Top 25%
Vendor Advisory fedoraproject.org Vendor Advisory fedoraproject.org
Affected: radsecproxy radsecproxy
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-32642?
CVE-2021-32642 has been scored as a high severity vulnerability.
How to fix CVE-2021-32642?
To fix CVE-2021-32642, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2021-32642 being actively exploited in the wild?
It is possible that CVE-2021-32642 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-32642?
CVE-2021-32642 affects radsecproxy radsecproxy.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.