Lucene search

K
redhatcveRedhat.comRH:CVE-2024-3596
HistoryJul 09, 2024 - 2:51 p.m.

CVE-2024-3596

2024-07-0914:51:24
redhat.com
access.redhat.com
47
radius protocol
authentication
spoofing
vulnerability
md5
unauthorized access

AI Score

8.9

Confidence

High

EPSS

0

Percentile

10.7%

A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.

Mitigation

Disable the use of RADIUS/UDP and RADIUS/TCP.
RADIUS/TLS or RADIUS/DTLS should be used.