The RADIUS protocol vulnerability affected several Cisco products
Remote Authentication Dial-in Service (RADIUS (https://www.ibm.com/docs/en/i/7.3?topic=authentication-remote-dial-in-user-service-overview)) protocol affecting multiple Cisco products A critical vulnerability has been disclosed.
💻 This CVE-2024-3596 (https://nvd.nist.gov/vuln/detail/CVE-2024-3596) vulnerability allows an attacker to spoof RADIUS responses, leading to unauthorized access to network resources. This vulnerability may affect many Cisco products.
Cisco’s Product Security Incident Response Team is actively investigating its products to determine which products and services may be affected by this vulnerability. (https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3#:~:text=CVE-2024-3596%3A%20RADIUS, against%20MD5%20Response%20Authenticator%20signature.)
The vulnerability isn’t limited to Cisco products, with tech companies including Microsoft, RedHat and Juniper Networks now investigating whether their products are affected.
✅ UZCERT service recommends network administrators to review their RADIUS configuration and take measures to protect their systems.