Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-3596

Опубликовано: 09 июл. 2024
Источник: redhat
CVSS3: 9

Описание

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.

Отчет

This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption. There are several preconditions for this attack to be possible:

  • An attacker needs man-in-the-middle network access between the RADIUS client and server
  • The client and server must be using RADIUS/UDP to communicate
  • The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication) Due to these attack surface limitations, the impact is rated Important. Within Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.

Меры по смягчению последствий

Disable the use of RADIUS/UDP and RADIUS/TCP. RADIUS/TLS or RADIUS/DTLS should be used.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6freeradiusOut of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle SupportfreeradiusFixedRHSA-2024:491130.07.2024
Red Hat Enterprise Linux 7 Extended Lifecycle Supportkrb5FixedRHSA-2024:878804.11.2024
Red Hat Enterprise Linux 8freeradiusFixedRHSA-2024:493631.07.2024
Red Hat Enterprise Linux 8krb5FixedRHSA-2024:886005.11.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportfreeradiusFixedRHSA-2024:491330.07.2024
Red Hat Enterprise Linux 8.2 Advanced Update Supportkrb5FixedRHSA-2024:878904.11.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportfreeradiusFixedRHSA-2024:487425.07.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportkrb5FixedRHSA-2024:879104.11.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicefreeradiusFixedRHSA-2024:487425.07.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-294->CWE-836->CWE-924

9 Critical

CVSS3

Связанные уязвимости

CVSS3: 9
ubuntu
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 9
nvd
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS3: 7.5
msrc
12 месяцев назад

CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability

CVSS3: 9
debian
11 месяцев назад

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ...

suse-cvrf
11 месяцев назад

Security update for freeradius-server

9 Critical

CVSS3