Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-3596

Опубликовано: 09 июл. 2024
Источник: nvd
CVSS3: 9
EPSS Низкий

Описание

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:*
Версия до 3.0.27 (исключая)
Конфигурация 2

Одно из

cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*
Конфигурация 3
cpe:2.3:o:sonicwall:sonicos:-:*:*:*:*:*:*:*

EPSS

Процентиль: 76%
0.0104
Низкий

9 Critical

CVSS3

Дефекты

CWE-354
CWE-200

Связанные уязвимости

CVSS3: 9
ubuntu
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
redhat
12 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 7.5
msrc
12 месяцев назад

CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability

CVSS3: 9
debian
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ...

suse-cvrf
11 месяцев назад

Security update for freeradius-server

EPSS

Процентиль: 76%
0.0104
Низкий

9 Critical

CVSS3

Дефекты

CWE-354
CWE-200