BDSA-2024-4606 |
|
Medium |
Jul 22, 2024 |
The RADIUS protocol, as used in products such as FreeBSD and FreeRadius, is vulnerable to response forgery due to weak MD5 hash usage in the response v
more...
The RADIUS protocol, as used in products such as FreeBSD and FreeRadius, is vulnerable to response forgery due to weak MD5 hash usage in the response verification which exposes the protocol to chosen-prefix collision attacks. This could allow a local attacker, with access to a RADIUS server's Access-Request communications, to intercept and arbitrarily modify response types. This could be leveraged to bypass authentication methods which rely on `Access-Challenge` or `Access-Reject` responses to verify authentication.
RADIUS servers which only use the Extensible Authentication Protocol (EAP), or use TLS/DTLS encryption, are not affected by this vulnerability.
less...
|
|