RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
References
Configurations
History
04 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2024-07-09 12:15
Updated : 2025-11-04 18:16
NVD link : CVE-2024-3596
Mitre link : CVE-2024-3596
CVE.ORG link : CVE-2024-3596
JSON object : View
Products Affected
broadcom
- fabric_operating_system
- brocade_sannav
freeradius
- freeradius
sonicwall
- sonicos
