I want to exhibit the md5 prefix collision exploit, is there a way to reproduce the md5 prefix collision of radius ? like mentioned in the CVE-2024-3596.
Post reproduction, I want to check if adding message authenticator avp is fixing the issue or not.
i tried to create a setup where mitm will be a linux machine which does the spoofing to receive the radius packet and try to execute the md5 collision (without md5 collision, the client receives the packet radius access accept), but its not working correctly (i.e. the packet formation is not done correctly where md5 prefix collision is exhibited). i am debugging the issue further to achieve this exploit, any available script could help here.
nd_me is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.