<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blast-RADIUS -  CVE-2024-3596 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220148#M36675</link>
    <description>&lt;P&gt;&lt;A href="https://www.blastradius.fail/" target="_blank" rel="noopener"&gt;https://www.blastradius.fail/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Blast-RADIUS is a vulnerability that affects the RADIUS protocol. RADIUS is a very common protocol used for authentication, authorization, and accounting (AAA) for networked devices on enterprise and telecommunication networks.&lt;/P&gt;
&lt;H3 id="what-can-the-attacker-do"&gt;What can the attacker do?&lt;/H3&gt;
&lt;P&gt;The Blast-RADIUS attack allows a man-in-the-middle attacker between the RADIUS client and server to forge a valid protocol accept message in response to a failed authentication request. This forgery could give the attacker access to network devices and services without the attacker guessing or brute forcing passwords or shared secrets. The attacker does not learn user credentials.&lt;/P&gt;
&lt;H3 id="who-is-affected"&gt;Who is affected?&lt;/H3&gt;
&lt;P&gt;Blast-RADIUS is a protocol vulnerability, and thus affects all RADIUS implementations using non-EAP authentication methods over UDP.&lt;/P&gt;
&lt;P&gt;System administrators of networks using RADIUS should check with vendors for a patch against this vulnerability, and follow best practices for RADIUS configuration as discussed below. There is nothing that end users can do on their own to protect against this attack.&lt;/P&gt;
&lt;P&gt;RADIUS is used in a wide variety of applications, including in enterprise networks to authenticate access to switches and other routing infrastructure, for VPN access, by ISPs for DSL and FTTH (Fiber to the Home), in 802.1X and Wi-Fi authentication, 2G and 3G cellular roaming and 5G DNN (Data Network Name) authentication, mobile Wi-Fi offload with SIM card-based authentication, private APN authentication, to authenticate access to critical infrastructure, and in the Eduroam and OpenRoaming wifi consortia.&lt;/P&gt;
&lt;H3 id="what-is-the-vulnerability"&gt;What is the vulnerability?&lt;/H3&gt;
&lt;P&gt;The RADIUS protocol predates modern cryptographic guarantees and is typically unencrypted and unauthenticated. However, the protocol does attempt to authenticate server responses using an ad hoc construction based on the MD5 hash function and a fixed shared secret between a client and server.&lt;/P&gt;
&lt;P&gt;Our attack combines a novel protocol vulnerability with an MD5 chosen-prefix collision attack and several new speed and space improvements. The attacker injects a malicious attribute into a request that causes a collision between the authentication information in the valid server response and the attacker’s desired forgery. This allows the attacker to turn a reject into an accept, and add arbitrary protocol attributes.&lt;/P&gt;</description>
    <pubDate>Tue, 09 Jul 2024 19:39:19 GMT</pubDate>
    <dc:creator>Alex-</dc:creator>
    <dc:date>2024-07-09T19:39:19Z</dc:date>
    <item>
      <title>Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220148#M36675</link>
      <description>&lt;P&gt;&lt;A href="https://www.blastradius.fail/" target="_blank" rel="noopener"&gt;https://www.blastradius.fail/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Blast-RADIUS is a vulnerability that affects the RADIUS protocol. RADIUS is a very common protocol used for authentication, authorization, and accounting (AAA) for networked devices on enterprise and telecommunication networks.&lt;/P&gt;
&lt;H3 id="what-can-the-attacker-do"&gt;What can the attacker do?&lt;/H3&gt;
&lt;P&gt;The Blast-RADIUS attack allows a man-in-the-middle attacker between the RADIUS client and server to forge a valid protocol accept message in response to a failed authentication request. This forgery could give the attacker access to network devices and services without the attacker guessing or brute forcing passwords or shared secrets. The attacker does not learn user credentials.&lt;/P&gt;
&lt;H3 id="who-is-affected"&gt;Who is affected?&lt;/H3&gt;
&lt;P&gt;Blast-RADIUS is a protocol vulnerability, and thus affects all RADIUS implementations using non-EAP authentication methods over UDP.&lt;/P&gt;
&lt;P&gt;System administrators of networks using RADIUS should check with vendors for a patch against this vulnerability, and follow best practices for RADIUS configuration as discussed below. There is nothing that end users can do on their own to protect against this attack.&lt;/P&gt;
&lt;P&gt;RADIUS is used in a wide variety of applications, including in enterprise networks to authenticate access to switches and other routing infrastructure, for VPN access, by ISPs for DSL and FTTH (Fiber to the Home), in 802.1X and Wi-Fi authentication, 2G and 3G cellular roaming and 5G DNN (Data Network Name) authentication, mobile Wi-Fi offload with SIM card-based authentication, private APN authentication, to authenticate access to critical infrastructure, and in the Eduroam and OpenRoaming wifi consortia.&lt;/P&gt;
&lt;H3 id="what-is-the-vulnerability"&gt;What is the vulnerability?&lt;/H3&gt;
&lt;P&gt;The RADIUS protocol predates modern cryptographic guarantees and is typically unencrypted and unauthenticated. However, the protocol does attempt to authenticate server responses using an ad hoc construction based on the MD5 hash function and a fixed shared secret between a client and server.&lt;/P&gt;
&lt;P&gt;Our attack combines a novel protocol vulnerability with an MD5 chosen-prefix collision attack and several new speed and space improvements. The attacker injects a malicious attribute into a request that causes a collision between the authentication information in the valid server response and the attacker’s desired forgery. This allows the attacker to turn a reject into an accept, and add arbitrary protocol attributes.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2024 19:39:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220148#M36675</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2024-07-09T19:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220154#M36677</link>
      <description>&lt;P&gt;Was following it also. No SK from Check Point, still very fresh and released today I think. (Some headsup yesterday).&lt;/P&gt;
&lt;P&gt;If I try to keep it simple the Radius server you can configure in SmartDashboard supports -&amp;gt; Radius V1 en V2. Protocol PAP or MS_Chap2&lt;/P&gt;
&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(Remote Authentication Dial-In User Service) server is used for authentication of users.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_cp variable"&gt;Check Point&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;uses the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;servers in these scenarios:&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable Vars_Other.tp_adminscap variable"&gt;Administrators&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;logging in to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_con variable"&gt;&lt;A class="MCTextPopup MCTextPopupHotSpot MCTextPopupHotSpot_ #text MCTextPopup_Closed" role="button" href="https://sc1.checkpoint.com/documents/R81.10/SmartConsole_OLH/EN/Topics-OLH/Ehr-XcQ5Rm711cJKCU7o_w2.htm?cshid=Ehr-XcQ5Rm711cJKCU7o_w2#" data-mc-state="closed" data-aria-describedby="e8607d29-b237-4e60-bcd0-473aac2d9fb1" target="_blank"&gt;SmartConsole&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable Vars_Endpoint_SandBlast.tp_eps_secr variable"&gt;SecuRemote&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Users (via IKE Hybrid Mode)&lt;/P&gt;
&lt;H2&gt;&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Configuration Fields&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Host&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is where the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;server is deployed.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Service&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is the port to which the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;server listens. Choose one of two predefined services.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is port number historically used by most installations.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;NEW-&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is the officially registered port number.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Shared secret&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is the secret between the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;server and the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Version&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;can be either&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Version 1.0, which is RFC 2138 compliant, and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Version 2.0 which is RFC 2865 compliant. For more, see:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;A href="https://tools.ietf.org/rfc/rfc2138.txt" target="_blank" rel="noopener"&gt;RFC 2138&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;A href="https://tools.ietf.org/rfc/rfc2865.txt" target="_blank" rel="noopener"&gt;RFC 2865&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Protocol&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is the type of authentication protocol that will be used when authenticating the user to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_radius variable"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;server. This type should be supported and enabled by the server. The MS-CHAP v2 protocol is supported by some servers, including Microsoft IAS and Cisco ACS. This protocol provides higher security and the ability to perform a password change, as an additional challenge in the authentication session, when the user is configured as "User must change password at next logon" on the server.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;----------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;Second is that you also can use Radius to authenticate to the Gaia OS(and API). But for now it is to late for me to check&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;(&lt;A href="https://support.checkpoint.com/results/sk/sk72940" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk72940&lt;/A&gt;)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2024 20:51:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220154#M36677</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-07-09T20:51:49Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220155#M36678</link>
      <description>&lt;P&gt;Thanks for that&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/10384"&gt;@Alex-&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2024 20:56:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220155#M36678</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-09T20:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220205#M36690</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Thanks for the info.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I captured some traffic for Radius VPN Auth with user/Pwd and Checkpoint does not send the&amp;nbsp;&lt;SPAN&gt;Message-Authenticator attribute (has expected bcs it was not mandatory in RFC).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But we do know now that we will need in the future to send it and also check if the reply from the server has it (and if its ok and not tempered).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Does checkpoint already have some info if this will be implemented? (dunno what its used has client in Checkpoint side but if free radius there are updated clients).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Vlad&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 10:50:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220205#M36690</guid>
      <dc:creator>vass</dc:creator>
      <dc:date>2024-07-10T10:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220224#M36700</link>
      <description>&lt;P&gt;I hope there will be an official sk about it soon, as one is not present in the support site as of yet, unless its internal...no idea.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 12:31:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220224#M36700</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-10T12:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220321#M36722</link>
      <description>&lt;P&gt;If an attacker has gained the&amp;nbsp;persistent MITM capabilities needed to exploit this, you're got far bigger issues to worry about.&lt;BR /&gt;In any case, it is under investigation.&lt;BR /&gt;Recommend opening a TAC case for tracking purposes.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 21:32:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220321#M36722</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-10T21:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220332#M36724</link>
      <description>&lt;P&gt;Thats true, but I think an official sk or IPS protection update would probably make lots of customers feel more comfortable.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 23:32:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220332#M36724</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-10T23:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220333#M36725</link>
      <description>&lt;P&gt;I assume once our investigation is completed, such things will be provided. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 23:37:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220333#M36725</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-10T23:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220334#M36726</link>
      <description>&lt;P&gt;I have no doubt about it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 23:39:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220334#M36726</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-10T23:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220370#M36729</link>
      <description>&lt;P&gt;Sure, but there are some scenarios were it "could" happen probably (non encrypted mpls or maybe even an transparent bridge doing an "l2" Mitm somewere) and we have always the state sponsored scenario wich has we know can pretty much do anything :).&lt;/P&gt;&lt;P&gt;Regardless i think clients and servers will have in a near future to update software to a&lt;SPAN&gt;lways send and require Message-Authenticator attributes for all requests and responses&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 09:30:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220370#M36729</guid>
      <dc:creator>vass</dc:creator>
      <dc:date>2024-07-11T09:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220421#M36733</link>
      <description>&lt;P&gt;Requiring/using Message Authenticator attributes in RADIUS requests/responses seems like the best short-term mitigation for this issue.&lt;BR /&gt;Was mentioned in an Ars Technica article I was reading, which goes into some detail about Blast RADIUS:&amp;nbsp;&lt;A href="https://arstechnica.com/security/2024/07/new-blast-radius-attack-breaks-30-year-old-protocol-used-in-networks-everywhere/" target="_blank"&gt;https://arstechnica.com/security/2024/07/new-blast-radius-attack-breaks-30-year-old-protocol-used-in-networks-everywhere/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 16:26:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220421#M36733</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-11T16:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220424#M36734</link>
      <description>&lt;P&gt;RADIUS over DTLS also mitigates this issue. Not a lot of servers support that, but this will hopefully drive server vendors to improve.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 17:10:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220424#M36734</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-07-11T17:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220476#M36740</link>
      <description>&lt;P&gt;Microsoft Patch breaks CP authentication.&lt;BR /&gt;&lt;A href="https://support.microsoft.com/en-us/topic/kb5040268-how-to-manage-the-access-request-packets-attack-vulnerability-associated-with-cve-2024-3596-a0e2f0b1-f200-4a7b-844f-48d1d5ab9e66" target="_blank"&gt;KB5040268: How to manage the Access-Request packets attack vulnerability associated with CVE-2024-3596 - Microsoft Support&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The changes MS did broke the Authentication from CP.&lt;BR /&gt;&lt;BR /&gt;I will open a Case for this.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Peter&lt;/P&gt;&lt;P&gt;PS I will report back&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 08:08:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220476#M36740</guid>
      <dc:creator>JP_Rex</dc:creator>
      <dc:date>2024-07-12T08:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220478#M36741</link>
      <description>&lt;P&gt;If they mandate the &lt;SPAN&gt;Message Authenticator it will break it, Checkpoint at least for VPN auth does no send it on the Access-request&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 08:32:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220478#M36741</guid>
      <dc:creator>vass</dc:creator>
      <dc:date>2024-07-12T08:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220480#M36742</link>
      <description>&lt;P&gt;there seems to be a way around this&lt;/P&gt;&lt;P&gt;###########&lt;/P&gt;&lt;P&gt;To add an exception to exclude a server from&amp;nbsp;&lt;STRONG&gt;requireauthmsg&lt;/STRONG&gt;&amp;nbsp;validation, run the following command:&lt;/P&gt;&lt;DIV class=""&gt;&lt;P&gt;netsh nps set requiremsgauth remoteservergroup =&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;&amp;lt;remote server group name&amp;gt;&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;address =&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;&amp;lt;server address&amp;gt;&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;exception = "yes"&lt;/P&gt;&lt;P&gt;########&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 12 Jul 2024 08:53:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220480#M36742</guid>
      <dc:creator>JP_Rex</dc:creator>
      <dc:date>2024-07-12T08:53:22Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220491#M36743</link>
      <description>&lt;P&gt;I'm also experiencing more RADIUS issues at a customer since the Microsoft patch. We're getting the error "RADIUS server is not responding" although it is. I've asked them to check the provided workaround to see if it will solve their issue. I'll keep you updated with the results.&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;Mitchel&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 09:25:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220491#M36743</guid>
      <dc:creator>tjoll</dc:creator>
      <dc:date>2024-07-12T09:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220496#M36744</link>
      <description>&lt;P&gt;We did not run the workaround. We fond the documentation after we rolled the Juli patch back on the primary radius DC.&lt;BR /&gt;&lt;BR /&gt;Let me know if it solved the issue.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Peter&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 09:35:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220496#M36744</guid>
      <dc:creator>JP_Rex</dc:creator>
      <dc:date>2024-07-12T09:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220498#M36745</link>
      <description>&lt;P&gt;The workaround will not achieve much, because the configuration for "requiremsgauth" is disabled on our site. I think it is disabled by default and needs to be enabled manually. So no exception needs to be added.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/60794"&gt;@JP_Rex&lt;/a&gt;&amp;nbsp;I'm curious to see what Checkpoint's response to your ticket is.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 09:41:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220498#M36745</guid>
      <dc:creator>lraaicfdb</dc:creator>
      <dc:date>2024-07-12T09:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220504#M36746</link>
      <description>&lt;P&gt;You're correct. I just got the confirmation that removing the update on the windows server does restore the radius authentication.&lt;BR /&gt;&lt;BR /&gt;I'll also create a CP case to make them aware of this issue.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 11:06:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220504#M36746</guid>
      <dc:creator>tjoll</dc:creator>
      <dc:date>2024-07-12T11:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Blast-RADIUS -  CVE-2024-3596</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220510#M36748</link>
      <description>&lt;P&gt;Support just gave me the following fix:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk42184" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk42184&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;We need to follow the steps described under the section&amp;nbsp;"To ignore RADIUS attribute 80 if the problem is with VPN Client authentication"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Effectively, changing the radius_ignore setting in the global properties to the value 80. I'll let you know if this will fix the issue.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 11:37:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220510#M36748</guid>
      <dc:creator>tjoll</dc:creator>
      <dc:date>2024-07-12T11:37:29Z</dc:date>
    </item>
  </channel>
</rss>

