CVE Vulnerabilities

CVE-2024-3596

Improper Validation of Integrity Check Value

Published: Jul 09, 2024 | Modified: Nov 04, 2025
CVSS 3.x
9
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
9 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

Weakness

The product does not validate or incorrectly validates the integrity check values or “checksums” of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.

Affected Software

NameVendorStart VersionEnd Version
FreeradiusFreeradius*3.0.27 (excluding)
Red Hat Enterprise Linux 7 Extended Lifecycle SupportRedHatfreeradius-0:3.0.20-1.el7_9.1*
Red Hat Enterprise Linux 7 Extended Lifecycle SupportRedHatkrb5-0:1.15.1-55.el7_9.3*
Red Hat Enterprise Linux 8RedHatfreeradius:3.0-8100020230904084920.69ef70f8*
Red Hat Enterprise Linux 8RedHatkrb5-0:1.18.2-30.el8_10*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatfreeradius:3.0-8020020240726095340.ce27ea5e*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatkrb5-0:1.17-19.el8_2.2*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatfreeradius:3.0-8040020240719063921.9ab73fbf*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatkrb5-0:1.18.2-9.el8_4.2*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatfreeradius:3.0-8040020240719063921.9ab73fbf*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatkrb5-0:1.18.2-9.el8_4.2*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatfreeradius:3.0-8040020240719063921.9ab73fbf*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatkrb5-0:1.18.2-9.el8_4.2*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatfreeradius:3.0-8060020240719034751.830b6f11*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatkrb5-0:1.18.2-16.el8_6.2*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatfreeradius:3.0-8060020240719034751.830b6f11*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatkrb5-0:1.18.2-16.el8_6.2*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatfreeradius:3.0-8060020240719034751.830b6f11*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatkrb5-0:1.18.2-16.el8_6.2*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatfreeradius:3.0-8080020240719112231.b012cf7d*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatkrb5-0:1.18.2-26.el8_8.3*
Red Hat Enterprise Linux 9RedHatfreeradius-0:3.0.21-40.el9_4*
Red Hat Enterprise Linux 9RedHatkrb5-0:1.21.1-4.el9_5*
Red Hat Enterprise Linux 9RedHatkrb5-0:1.21.1-4.el9_5*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatfreeradius-0:3.0.21-26.el9_0.1*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatkrb5-0:1.19.1-16.el9_0.2*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatfreeradius-0:3.0.21-38.el9_2.2*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatkrb5-0:1.20.1-9.el9_2.2*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatkrb5-0:1.21.1-2.el9_4.1*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-kf-notebook-controller-rhel8:sha256:3e670a110eb3a6e59c6051b485bc88d39cb921b31854f36073f2088d52b53ce1*
FreeradiusUbuntuesm-infra/bionic*
FreeradiusUbuntuesm-infra/focal*
FreeradiusUbuntuesm-infra/xenial*
FreeradiusUbuntufocal*
FreeradiusUbuntujammy*
FreeradiusUbuntumantic*
FreeradiusUbuntunoble*
FreeradiusUbuntuupstream*
Krb5Ubuntudevel*
Krb5Ubuntuesm-infra-legacy/trusty*
Krb5Ubuntuesm-infra/bionic*
Krb5Ubuntuesm-infra/focal*
Krb5Ubuntuesm-infra/xenial*
Krb5Ubuntufocal*
Krb5Ubuntujammy*
Krb5Ubuntunoble*
Krb5Ubuntuoracular*
Krb5Ubuntuplucky*
Krb5Ubuntuquesting*
Krb5Ubuntutrusty/esm*
Libpam-radius-authUbuntufocal*
Libpam-radius-authUbuntuoracular*
Libpam-radius-authUbuntutrusty/esm*
Libpam-radius-authUbuntuupstream*

Potential Mitigations

References