From 951036b94c4191f2e47cc2266351c0d545a93f5c Mon Sep 17 00:00:00 2001 From: daniellasurya <108962762+daniellasurya@users.noreply.github.com> Date: Tue, 30 Jul 2024 12:01:37 +0800 Subject: [PATCH] commit-002 --- .../20240730002-Cisco-Critical-RADIUS-Protocol-Vulnerability.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/advisories/20240730002-Cisco-Critical-RADIUS-Protocol-Vulnerability.md b/docs/advisories/20240730002-Cisco-Critical-RADIUS-Protocol-Vulnerability.md index fb984778..c623d3df 100644 --- a/docs/advisories/20240730002-Cisco-Critical-RADIUS-Protocol-Vulnerability.md +++ b/docs/advisories/20240730002-Cisco-Critical-RADIUS-Protocol-Vulnerability.md @@ -2,7 +2,7 @@ ## Overview -The WA SOC has been made aware of a vulnerability in the RADIUS protocol, a widely used authentication and authorization framework for network access. This vulnerability could allow an attacker to bypass multi-factor authentication (MFA) and gain unauthorized access to networks. +The WA SOC has been made aware of a vulnerability in the RADIUS protocol, a widely used authentication and authorization framework for network access. The vulnerability stems from a flaw in the MD5 Response Authenticator signature used in the RADIUS protocol. An attacker with network access can exploit this flaw to forge RADIUS responses, effectively bypassing authentication measures. This could lead to unauthorized access to sensitive network resources. ## What is vulnerable?