CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-3596: RADIUS Protocol under RFC2865 is vulnerable to forgery attacks.

Description

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

Classification

CVE ID: CVE-2024-3596

Affected Products

Vendor: IETF

Product: RFC

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.16% (probability of being exploited)

EPSS Percentile: 53.74% (scored less or equal to compared to others)

EPSS Date: 2025-03-14 (when was this score calculated)

References

https://datatracker.ietf.org/doc/html/rfc2865
https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/
https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf
https://www.blastradius.fail/
http://www.openwall.com/lists/oss-security/2024/07/09/4
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014

Timeline