TopVuln

High-risk vulnerability digests

CVE-2024-3596

  • CRITICAL

cret@cert.org

Details

CVSS v3
9.0
NVD published
2024-07-09 12:15:20
Affected versions
cpe:2.3:a:freeradius:freeradius:*:*:*:*:*:*:*:* cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:* cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sonicos:-:*:*:*:*:*:*:*
Summary
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Remediation
Not available in our cache.
Exploit info
Not available in our cache.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.