CVE-2024-3596

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:sonicwall:sonicos:-:*:*:*:*:*:*:*

History

04 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://www.kb.cert.org/vuls/id/456537 -

Information

Published : 2024-07-09 12:15

Updated : 2025-11-04 18:16


NVD link : CVE-2024-3596

Mitre link : CVE-2024-3596

CVE.ORG link : CVE-2024-3596


JSON object : View

Products Affected

broadcom

  • fabric_operating_system
  • brocade_sannav

freeradius

  • freeradius

sonicwall

  • sonicos
CWE
CWE-354

Improper Validation of Integrity Check Value

CWE-924

Improper Enforcement of Message Integrity During Transmission in a Communication Channel