Customers and Partners for Thales have received the following notice recently:
Following the discovery of the RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS – CVE-2024-3596), the industry is moving towards stricter enforcement of the Message-Authenticator attribute (RADIUS Attribute 80) to ensure the integrity and authenticity of authentication packets.
In alignment with this, Thales will upgrade the STA RADIUS server to include the Message-Authenticator attribute in all RADIUS responses and challenges.
Details for CP products are found in sk182516: Check Point Response to CVE-2024-3596 - Blast-RADIUS attack
Still, there might be an issue during communication, see sk183244: RADIUS authentication fails after installing Jumbo Hotfix Accumulator
CCSP - CCSE / CCTE / CTPS / CCME / CCSM Elite / SMB Specialist