跳转到帖子

Aruba AOS-10: CVE-2024-3596: RADIUS protocol susceptible to forgery attacks

recommended_posts

发布于
  • Members

Aruba AOS-10: CVE-2024-3596: RADIUS protocol susceptible to forgery attacks

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
07/12/2024
Created
01/16/2025
Added
01/14/2025
Modified
02/07/2025

Description

A forgery attack has been discovered against the Response Authenticator in RADIUS/UDP, specifically targeting RFC 2865. This attack allows a man-in-the-middle to forge a valid Access-Accept response to a client request that was initially rejected by the RADIUS server, thereby granting unauthorized network access. The vulnerability exploits a chosen-prefix collision attack on MD5, manipulating the first byte and packet attributes of Access-Reject messages to match the Response Authenticator of a forged Access-Accept message. The attack requires appending a minimal amount of collision block gibberish to the Access-Request, which is then encapsulated in Proxy-State attributes and processed by the server, ensuring the computed Response Authenticator matches for both the legitimate Access-Reject and the forged Access-Accept. The attacker must have man-in-the-middle access between the RADIUS client and server and the ability to trigger an Access-Request. By predicting the Access-Reject response and computing an MD5 chosen-prefix collision (within 5 to 6 minutes, potentially faster with more resources), the attacker can modify the client request, remove any Message-Authenticator attributes if PAP authentication is used, and forge an Access-Accept response by copying the Response Authenticator from the Access-Reject response. This modified response, when sent to the client, grants the attacker unauthorized access to resources authenticated/authorized via RADIUS.

Solution(s)

  • aruba-aos-10-cve-2024-3596

References

  • https://attackerkb.com/topics/cve-2024-3596
  • CVE - 2024-3596
  • https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04662.json
  • 查看数 699
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…