In freeradius, the EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://freeradius.org/security/ | patch vendor advisory |
https://github.com/FreeRADIUS/freeradius-server/commit/9e5e8f2f | third party advisory patch |