RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ietf
Ietf rfc |
|
CPEs | cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:* | |
Vendors & Products |
Ietf
Ietf rfc |
|
Metrics |
ssvc
|
Thu, 13 Feb 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openshift Ai
|
|
CPEs | cpe:/a:redhat:openshift_ai:2.16::el8 | |
Vendors & Products |
Redhat openshift Ai
|
Mon, 30 Dec 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Broadcom
Broadcom brocade Sannav Broadcom fabric Operating System Freeradius Freeradius freeradius Sonicwall Sonicwall sonicos |
|
Weaknesses | CWE-354 | |
CPEs | cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:* cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:* cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sonicos:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Broadcom
Broadcom brocade Sannav Broadcom fabric Operating System Freeradius Freeradius freeradius Sonicwall Sonicwall sonicos |
Thu, 14 Nov 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:rhel_eus:9.4 |
Wed, 13 Nov 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:9 |
Wed, 06 Nov 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:8 |
Tue, 05 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:rhel_aus:8.6 cpe:/o:redhat:rhel_e4s:8.6 cpe:/o:redhat:rhel_eus:8.8 cpe:/o:redhat:rhel_tus:8.6 |
Mon, 04 Nov 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:rhel_aus:8.2 cpe:/o:redhat:rhel_aus:8.4 cpe:/o:redhat:rhel_e4s:8.4 cpe:/o:redhat:rhel_tus:8.4 |
Thu, 29 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 23 Aug 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-02-13T17:52:35.412Z
Reserved: 2024-04-10T15:09:45.391Z
Link: CVE-2024-3596

Updated: 2024-08-29T14:32:14.851Z

Status : Analyzed
Published: 2024-07-09T12:15:20.700
Modified: 2024-12-30T19:23:20.437
Link: CVE-2024-3596
