July 10, 2024
Threat Level : Critical
Threat: RADIUS Protocol Spoofing Vulnerability
SUMMARY
On July 7, 2024, security researchers disclosed the following vulnerability in the RADIUS protocol:
CVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
This vulnerability may impact any RADIUS client and server.
SEVERITY
5ironCyber considers this a serious threat.
ACTIONS
- There are no workarounds that address this vulnerability.
- Cisco is investigating its product line to determine which products may be affected by this vulnerability and the impact on each affected product.
- Cisco will be updating the advisory referenced in the links below as more information becomes available.
SOURCES
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ
- https://www.kb.cert.org/vuls/id/456537