vulnerability
SUSE: CVE-2024-3596: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Jul 9, 2024 | Jul 10, 2024 | Dec 5, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Jul 9, 2024
Added
Jul 10, 2024
Modified
Dec 5, 2025
Description
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Solutions
suse-upgrade-freeradius-serversuse-upgrade-freeradius-server-develsuse-upgrade-freeradius-server-docsuse-upgrade-freeradius-server-krb5suse-upgrade-freeradius-server-ldapsuse-upgrade-freeradius-server-ldap-schemassuse-upgrade-freeradius-server-libssuse-upgrade-freeradius-server-mysqlsuse-upgrade-freeradius-server-perlsuse-upgrade-freeradius-server-postgresqlsuse-upgrade-freeradius-server-pythonsuse-upgrade-freeradius-server-python3suse-upgrade-freeradius-server-sqlitesuse-upgrade-freeradius-server-utils
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.