CVE-2024-3596

Public on 2024-07-09
Modified on 2025-01-28
Description
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Severity
Important severity
Important
See what this means
CVSS v3 Base Score
8.7
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 freeradius No Fix Planned
Amazon Linux 2 - Core freeradius 2024-08-06 ALAS2-2024-2611 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 8.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
NVD CVSSv3 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H