Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-3596
HistoryJul 09, 2024 - 12:00 a.m.

CVE-2024-3596

2024-07-0900:00:00
ubuntu.com
ubuntu.com
18
cve-2024-3596
forgery attacks
local attacker
chosen-prefix collision attack
md5 response authenticator
radius clients

AI Score

9.4

Confidence

High

EPSS

0

Percentile

10.7%

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local
attacker who can modify any valid Response (Access-Accept, Access-Reject,
or Access-Challenge) to any other response using a chosen-prefix collision
attack against MD5 Response Authenticator signature.

Notes

Author Note
alexmurray RADIUS clients may also be affected