<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Thales Mandatory Security Update - STA RADIUS Server to Enforce Message-Authenticator by July 31 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Thales-Mandatory-Security-Update-STA-RADIUS-Server-to-Enforce/m-p/250928#M41981</link>
    <description>&lt;P&gt;Done in sk182516:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;For versions that do not contain the hotfix yet, or if you choose not to upgrade, follow one of these mitigations:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use other and more secured authentication protocols, such as SAML or LDAPS.&lt;BR /&gt;or&lt;/LI&gt;
&lt;LI&gt;If RADIUS authentication is still required, then as a best practice:
&lt;OL&gt;
&lt;LI&gt;The RADIUS server should be on an isolated internal network with Anti-Spoofing enabled.&lt;/LI&gt;
&lt;LI&gt;Follow the "Solution" steps in &lt;A href="https://support.checkpoint.com/results/sk/sk42184" target="_blank" rel="noopener"&gt;sk42184&lt;/A&gt;&amp;nbsp;to ignore the RADIUS attribute 80.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Tue, 10 Jun 2025 07:17:25 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2025-06-10T07:17:25Z</dc:date>
    <item>
      <title>Thales Mandatory Security Update - STA RADIUS Server to Enforce Message-Authenticator by July 31, 20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Thales-Mandatory-Security-Update-STA-RADIUS-Server-to-Enforce/m-p/250593#M41917</link>
      <description>&lt;P&gt;Customers and Partners for Thales have received the following notice recently:&lt;/P&gt;
&lt;P class="x_xmsonormal" style="margin: 0cm; font-size: 12pt; font-family: Aptos, sans-serif; color: #242424; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;EM&gt;Following the discovery of the&amp;nbsp;&lt;STRONG&gt;RADIUS Protocol Spoofing Vulnerability (&lt;/STRONG&gt;&lt;A style="border: 0px; font: inherit; margin: 0px; padding: 0px; vertical-align: baseline; color: #467886; text-decoration: underline;" title="https://www.blastradius.fail/" href="https://www.blastradius.fail/" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="13"&gt;&lt;STRONG&gt;Blast-RADIUS – CVE-2024-3596&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;)&lt;/STRONG&gt;, the industry is moving towards stricter enforcement of the Message-Authenticator attribute (RADIUS Attribute 80) to ensure the integrity and authenticity of authentication packets.&lt;/EM&gt;&lt;/P&gt;
&lt;P class="x_xmsonormal" style="margin: 0cm; font-size: 12pt; font-family: Aptos, sans-serif; color: #242424; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;EM&gt;In alignment with this, Thales will upgrade the&amp;nbsp;&lt;STRONG&gt;STA RADIUS server&lt;/STRONG&gt;&amp;nbsp;to&amp;nbsp;&lt;STRONG&gt;include the Message-Authenticator attribute in all RADIUS responses and challenges&lt;/STRONG&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P class="x_xmsonormal" style="margin: 0cm; font-size: 12pt; font-family: Aptos, sans-serif; color: #242424; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="x_xmsonormal" style="margin: 0cm; font-size: 12pt; font-family: Aptos, sans-serif; color: #242424; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;SPAN&gt;Details for CP products are found in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182516" target="_blank" rel="noopener"&gt;sk182516: Check Point Response to CVE-2024-3596 - Blast-RADIUS attack&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="x_xmsonormal" style="margin: 0cm; font-size: 12pt; font-family: Aptos, sans-serif; color: #242424; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="x_xmsonormal" style="margin: 0cm; font-size: 12pt; font-family: Aptos, sans-serif; color: #242424; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;SPAN&gt;Still, there might be an issue during communication, see&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk183244" target="_blank" rel="noopener"&gt;sk183244: RADIUS authentication fails after installing Jumbo Hotfix Accumulator&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 13:12:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Thales-Mandatory-Security-Update-STA-RADIUS-Server-to-Enforce/m-p/250593#M41917</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-06-04T13:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: Thales Mandatory Security Update - STA RADIUS Server to Enforce Message-Authenticator by July 31</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Thales-Mandatory-Security-Update-STA-RADIUS-Server-to-Enforce/m-p/250686#M41942</link>
      <description>&lt;P&gt;anyone from CP can say how it will be with Gaia Embedded ?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2025 09:53:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Thales-Mandatory-Security-Update-STA-RADIUS-Server-to-Enforce/m-p/250686#M41942</guid>
      <dc:creator>Martin_Valenta</dc:creator>
      <dc:date>2025-06-05T09:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: Thales Mandatory Security Update - STA RADIUS Server to Enforce Message-Authenticator by July 31</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Thales-Mandatory-Security-Update-STA-RADIUS-Server-to-Enforce/m-p/250928#M41981</link>
      <description>&lt;P&gt;Done in sk182516:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;For versions that do not contain the hotfix yet, or if you choose not to upgrade, follow one of these mitigations:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use other and more secured authentication protocols, such as SAML or LDAPS.&lt;BR /&gt;or&lt;/LI&gt;
&lt;LI&gt;If RADIUS authentication is still required, then as a best practice:
&lt;OL&gt;
&lt;LI&gt;The RADIUS server should be on an isolated internal network with Anti-Spoofing enabled.&lt;/LI&gt;
&lt;LI&gt;Follow the "Solution" steps in &lt;A href="https://support.checkpoint.com/results/sk/sk42184" target="_blank" rel="noopener"&gt;sk42184&lt;/A&gt;&amp;nbsp;to ignore the RADIUS attribute 80.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 10 Jun 2025 07:17:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Thales-Mandatory-Security-Update-STA-RADIUS-Server-to-Enforce/m-p/250928#M41981</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-06-10T07:17:25Z</dc:date>
    </item>
  </channel>
</rss>

