RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
References
Configurations
History
No history.
Information
Published : 2024-07-09 12:15
Updated : 2025-11-04 18:16
NVD link : CVE-2024-3596
Mitre link : CVE-2024-3596
CVE.ORG link : CVE-2024-3596
JSON object : View
Products Affected
sonicwall
- sonicos
freeradius
- freeradius
broadcom
- fabric_operating_system
- brocade_sannav
