RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
References
Configurations
History
30 Dec 2024, 19:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sonicos:-:*:*:*:*:*:*:* cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:* cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:* |
|
References |
|
|
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014 - Third Party Advisory | |
References | () https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/ - Technical Description | |
References | () https://datatracker.ietf.org/doc/html/rfc2865 - Technical Description | |
References | () https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/09/4 - Mailing List | |
References | () https://www.blastradius.fail/ - Technical Description | |
First Time |
Freeradius freeradius
Sonicwall sonicos Broadcom brocade Sannav Broadcom fabric Operating System Freeradius Sonicwall Broadcom |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.0 |
CWE | CWE-924 CWE-354 |
23 Jul 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-09 12:15
Updated : 2025-03-18 16:15
NVD link : CVE-2024-3596
Mitre link : CVE-2024-3596
JSON object : View
Products Affected
freeradius
- freeradius
sonicwall
- sonicos
broadcom
- brocade_sannav
- fabric_operating_system