RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Metrics
Affected Vendors & Products
References
History
Thu, 29 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 23 Aug 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
MITRE
Status: PUBLISHED
Assigner: certcc
Published: 2024-07-09T12:02:53.001Z
Updated: 2024-08-29T14:32:14.851Z
Reserved: 2024-04-10T15:09:45.391Z
Link: CVE-2024-3596
Vulnrichment
Updated: 2024-08-29T14:32:14.851Z
NVD
Status : Awaiting Analysis
Published: 2024-07-09T12:15:20.700
Modified: 2024-07-23T09:15:02.697
Link: CVE-2024-3596
Redhat