CVE-2010-0524Apple MAC OS X vulnerability

CWE-2644 documents4 sources
Severity
7.5HIGHNVD
EPSS
0.4%
top 40.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 30
Latest updateMay 2

Description

The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote attackers to obtain network connectivity via a crafted RADIUS Access Request message.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages2 packages

NVDapple/mac_os_x_server10.6.0, 10.6.1, 10.6.2+2
NVDapple/mac_os_x10.6.0, 10.6.1, 10.6.2+2

🔴Vulnerability Details

2
GHSA
GHSA-9v7p-64xp-q6jf: The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 102022-05-02
CVEList
CVE-2010-0524: The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 102010-03-30

📋Vendor Advisories

1
Debian
CVE-2010-0524: freeradius - The default configuration of the FreeRADIUS server in Apple Mac OS X Server befo...2010
CVE-2010-0524 — Apple MAC OS X vulnerability | cvebase