6.4

CVE-2012-4566

The DTLS support in radsecproxy before 1.6.2 does not properly verify certificates when there are configuration blocks with CA settings that are unrelated to the block being used for verifying the certificate chain, which might allow remote attackers to bypass intended access restrictions and spoof clients, a different vulnerability than CVE-2012-4523.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
UninettRadsecproxy Version <= 1.6.1
UninettRadsecproxy Version1.0
UninettRadsecproxy Version1.0 Updatealpha
UninettRadsecproxy Version1.0 Updatealpha-p1
UninettRadsecproxy Version1.0 Updatep1
UninettRadsecproxy Version1.1
UninettRadsecproxy Version1.1 Updatealpha
UninettRadsecproxy Version1.1 Updatebeta
UninettRadsecproxy Version1.2
UninettRadsecproxy Version1.3 Updatealpha
UninettRadsecproxy Version1.3 Updatebeta
UninettRadsecproxy Version1.3.1
UninettRadsecproxy Version1.4
UninettRadsecproxy Version1.4.1
UninettRadsecproxy Version1.4.2
UninettRadsecproxy Version1.4.3
UninettRadsecproxy Version1.5
UninettRadsecproxy Version1.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.18% 0.356
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:P/I:P/A:N