Severity
9.0CRITICALNVD
EPSS
13.7%
top 5.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 9
Latest updateFeb 5

Description

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 2.2 | Impact: 6.0

Affected Packages6 packages

NVDfreeradius/freeradius< 3.0.27
Debianfreeradius/freeradius< 3.2.5+dfsg-1+1
CVEListV5ietf/rfc2865
Palo Altopaloalto/pan-os

🔴Vulnerability Details

5
OSV
BlastRADIUS also affects eduMFA2024-07-17
GHSA
BlastRADIUS also affects eduMFA2024-07-17
GHSA
GHSA-3g8x-wqfp-q876: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject,2024-07-09
CVEList
RADIUS Protocol under RFC2865 is vulnerable to forgery attacks.2024-07-09
OSV
CVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject,2024-07-09

📋Vendor Advisories

8
Ubuntu
Kerberos vulnerability2025-02-05
Oracle
Oracle Oracle Communications Risk Matrix: Configuration (Kerberos) — CVE-2024-35962025-01-15
Ubuntu
FreeRADIUS vulnerability2024-10-03
Cisco
RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 20242024-07-10
Palo Alto
PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation2024-07-10
CVE-2024-3596 — BlastRADIUS | cvebase