Critical Severity Vulnerability
This vulnerability has been rated as Critical severity. Immediate action is recommended.
CVE-2024-3596
CriticalVulnerability Description
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Known Affected Software
90 configuration(s) from 3 vendor(s)
cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.13:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.14:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.17:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.23:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.15:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.25:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.9:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.26:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.22:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.12:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.7:-:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.4:-:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.11:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.16:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.20:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.18:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.19:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.8:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.11:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.1.12:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.21:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.24:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.0:-:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:freeradius:freeradius:1.1.3:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sonicos:-:*:*:*:*:*:*:*
2024-Jul-CVE-2024-3596
CVE-2024-3596: CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability
CPUJAN2025
Oracle Critical Patch Update Advisory - January 2025
References & Resources
-
http://www.openwall.com/lists/oss-security/2024/07/09/4cret@cert.org Mailing List
-
https://cert-portal.siemens.com/productcert/html/ssa-723487.htmlcret@cert.org
-
https://cert-portal.siemens.com/productcert/html/ssa-794185.htmlcret@cert.org
-
https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/cret@cert.org Technical Description
-
https://datatracker.ietf.org/doc/html/rfc2865cret@cert.org Technical Description
-
https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdfcret@cert.org Third Party Advisory
-
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014cret@cert.org Third Party Advisory
-
https://www.blastradius.fail/cret@cert.org Technical Description
-
http://www.openwall.com/lists/oss-security/2024/07/09/4af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/af854a3a-2127-422b-91ae-364da2661108 Technical Description
-
https://datatracker.ietf.org/doc/html/rfc2865af854a3a-2127-422b-91ae-364da2661108 Technical Description
-
https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdfaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20240822-0001/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://today.ucsd.edu/story/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocolaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.blastradius.fail/af854a3a-2127-422b-91ae-364da2661108 Technical Description
-
https://www.kb.cert.org/vuls/id/456537af854a3a-2127-422b-91ae-364da2661108
Severity Details
Weakness Type (CWE)
Improper Validation of Integrity Check Value
- Description
- The product does not validate or incorrectly validates the integrity check values or "checksums" of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.
- Exploit Likelihood
- Medium
- Typical Severity
- Medium
- Abstraction Level
- Base
Key Information
- Published Date
- July 09, 2024
