CVE-2021-32642Improper Input Validation in Radsecproxy

Severity
9.4CRITICALNVD
EPSS
1.5%
top 18.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 28

Description

radsecproxy is a generic RADIUS proxy that supports both UDP and TLS (RadSec) RADIUS transports. Missing input validation in radsecproxy's `naptr-eduroam.sh` and `radsec-dynsrv.sh` scripts can lead to configuration injection via crafted radsec peer discovery DNS records. Users are subject to Information disclosure, Denial of Service, Redirection of Radius connection to a non-authenticated server leading to non-authenticated network access. Updated example scripts are available in the master bran

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:HExploitability: 3.9 | Impact: 5.5

Affected Packages4 packages

debiandebian/radsecproxy< radsecproxy 1.8.2-4 (bookworm)
NVDuninett/radsecproxy< 1.9.0
CVEListV5radsecproxy/radsecproxy< 1.9.0
Debianradsecproxy/radsecproxy< 1.8.2-4+3

Also affects: Fedora 33, 34

🔴Vulnerability Details

1
OSV
CVE-2021-32642: radsecproxy is a generic RADIUS proxy that supports both UDP and TLS (RadSec) RADIUS transports2021-05-28

📋Vendor Advisories

1
Debian
CVE-2021-32642: radsecproxy - radsecproxy is a generic RADIUS proxy that supports both UDP and TLS (RadSec) RA...2021
CVE-2021-32642 — Improper Input Validation | cvebase