CVE-2024-3596 — BlastRADIUS: Improper Validation of Integrity Check Value in Paloalto Prisma Access
CWE-354 — Improper Validation of Integrity Check ValueCWE-924 — Improper Enforcement of Message Integrity During Transmission in a Communication ChannelCWE-200 — Sensitive Information ExposureCWE-327 — Use of a Broken or Risky Cryptographic AlgorithmCWE-294 — Authentication Bypass by Capture-replayCWE-836 — Use of Password Hash Instead of Password for AuthenticationCWE-290 — Authentication Bypass by Spoofing15 documents13 sources
Severity
9.0CRITICALNVD
EPSS
13.7%
top 5.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 9
Latest updateFeb 5
Description
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 2.2 | Impact: 6.0
Affected Packages6 packages
🔴Vulnerability Details
5GHSA▶
GHSA-3g8x-wqfp-q876: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject,↗2024-07-09
OSV▶
CVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject,↗2024-07-09
📋Vendor Advisories
8Oracle
▶
Palo Alto
▶