Critical severity9.0NVD Advisory· Published Jul 9, 2024· Updated May 12, 2026
CVE-2024-3596
CVE-2024-3596
Description
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Affected products
1- IETF/RFCv5Range: 2865
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- networkradius.com/assets/pdf/radius_and_md5_collisions.pdfnvdThird Party Advisory
- psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014nvdThird Party Advisory
- security.netapp.com/advisory/ntap-20240822-0001/nvdThird Party Advisory
- today.ucsd.edu/story/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocolnvdThird Party Advisory
- www.openwall.com/lists/oss-security/2024/07/09/4nvdMailing List
- datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/nvdTechnical Description
- datatracker.ietf.org/doc/html/rfc2865nvdTechnical Description
- www.blastradius.failnvdTechnical Description
- cert-portal.siemens.com/productcert/html/ssa-364175.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-723487.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-770770.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-794185.htmlnvd
- www.kb.cert.org/vuls/id/456537nvd
News mentions
0No linked articles in our index yet.