Lucene search

K
cveCertccCVE-2024-3596
HistoryJul 09, 2024 - 12:15 p.m.

CVE-2024-3596

2024-07-0912:15:20
certcc
web.nvd.nist.gov
1638
23
rfc 2865
radius protocol
chosen-prefix collision
md5
forgery attacks
local attacker

AI Score

6.4

Confidence

High

EPSS

0

Percentile

10.7%

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CNA Affected

[
  {
    "vendor": "IETF",
    "product": "RFC",
    "versions": [
      {
        "status": "affected",
        "version": "2865"
      }
    ]
  }
]

Social References

More