Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-19568 | Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid protocol accept message in response to a failed authentication request. |
Wed, 14 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dell
Dell openmanage Network Integration |
|
| CPEs | cpe:2.3:a:dell:openmanage_network_integration:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dell
Dell openmanage Network Integration |
Mon, 30 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Jun 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid protocol accept message in response to a failed authentication request. | |
| Weaknesses | CWE-294 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2026-02-26T17:50:20.464Z
Reserved: 2025-04-15T21:31:17.348Z
Link: CVE-2025-36593
Updated: 2025-06-30T18:53:53.804Z
Status : Analyzed
Published: 2025-06-30T19:15:23.580
Modified: 2026-01-14T18:49:32.523
Link: CVE-2025-36593
No data.
OpenCVE Enrichment
No data.
EUVD