RADIUS Protocol under RFC 2865 is susceptible to forgery...
Critical severity
Unreviewed
Published
Jul 9, 2024
to the GitHub Advisory Database
•
Updated Dec 30, 2024
Description
Published by the National Vulnerability Database
Jul 9, 2024
Published to the GitHub Advisory Database
Jul 9, 2024
Last updated
Dec 30, 2024
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
References