The moderate-severity vulnerability has been observed being exploited in the wild by Chinese APT Velvet Ant.| CSO Online
A design flaw in the decades-old RADIUS authentication protocol allows attackers to take over network devices from a man-in-the-middle position by exploiting MD5 hash collisions.| CSO Online