Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A vulnerability in the RADIUS protocol exposes networks to MitM attacks
Global Security

A vulnerability in the RADIUS protocol exposes networks to MitM attacks

AdminBy AdminJuly 9, 2024No Comments3 Mins Read
RADIUS Protocol Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 9, 2024Information hallVulnerability / Network Security

RADIUS protocol vulnerability

Cyber ​​security researchers have discovered a security vulnerability in the RADIUS network authentication protocol no RADIUS Blast which can be used by an attacker to perform Mallory-in-the-middle (MitM) attacks and bypass integrity checks under certain circumstances.

“The RADIUS protocol allows some Access-Request messages to fail integrity or authentication checks,” said InkBridge Networks CEO Alan Decock, who created The FreeRADIUS projectthe statement said.

“As a result, an attacker can modify these packets without detection. An attacker will be able to force any user to authenticate and give them any authorization (VLAN, etc.).”

RADIUS, short for Remote Authentication Dial-In User Service, is a client/server protocol which provides centralized authentication, authorization, and account management (AAA) for users connecting to and using a network service.

Cyber ​​security

RADIUS security is there relying on the hash which is obtained with the help of MD5 algorithmwhich was counted cryptographically broken as of December 2008 due to risk collision attacks.

This means that Access-Request packets can be subjected to a so-called chosen-prefix attack, which allows the response packet to be altered in such a way that it passes all integrity checks of the original response.

However, for the attack to be successful, the adversary must be able to modify the RADIUS packets transmitted between the RADIUS client and the server. It also means that organizations that send packages over the Internet are at risk of shortages.

Other mitigating factors that prevent the attack from being powerful include the use of TLS to carry RADIUS traffic over the Internet and the increased security of packets through The message authenticator attribute.

BlastRADIUS is the result of a fundamental design flaw and is said to affect all standards-compliant RADIUS clients and servers, making it imperative that Internet Service Providers (ISPs) and organizations using the protocol update to the latest version.

“In particular, PAP, CHAP, and MS-CHAPv2 authentication methods are the most vulnerable,” Decock said. “ISPs will have to upgrade RADIUS servers and network hardware.”

“Anyone using MAC address or RADIUS authentication to log in administrators on the switch is vulnerable. Using TLS or IPSec prevents the attack, and 802.1X (EAP) is not vulnerable.”

Cyber ​​security

For enterprises, an attacker must already have access to control the virtual local area network (VLAN). Moreover, ISPs may be susceptible if they send RADIUS traffic over intermediate networks such as third-party outsourced networks or the wider Internet.

It should be noted that the vulnerability, which has a CVSS score of 9.0, particularly affects networks that send RADIUS/UDP traffic over the Internet, given that “most RADIUS traffic is sent ‘in the open.'” There is no evidence that it is being used in wild nature.

“This attack is the result of the security of the RADIUS protocol being neglected for a very long time,” DeKock said.

“While standards have long offered safeguards that would prevent an attack, these safeguards have not been mandatory. In addition, many vendors have not even implemented the proposed protections.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.