Логотип exploitDog
bind:CVE-2025-36593
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-36593

Количество 2

Количество 2

nvd логотип

CVE-2025-36593

7 месяцев назад

Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid protocol accept message in response to a failed authentication request.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-h9wx-jcxv-wqp5

7 месяцев назад

Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid protocol accept message in response to a failed authentication request.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-36593

Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid protocol accept message in response to a failed authentication request.

CVSS3: 8.8
0%
Низкий
7 месяцев назад
github логотип
GHSA-h9wx-jcxv-wqp5

Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid protocol accept message in response to a failed authentication request.

CVSS3: 8.8
0%
Низкий
7 месяцев назад

Уязвимостей на страницу