Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
G_W_Albrecht
Legend Legend
Legend

Thales Mandatory Security Update - STA RADIUS Server to Enforce Message-Authenticator by July 31, 20

Customers and Partners for Thales have received the following notice recently:

Following the discovery of the RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS – CVE-2024-3596), the industry is moving towards stricter enforcement of the Message-Authenticator attribute (RADIUS Attribute 80) to ensure the integrity and authenticity of authentication packets.

In alignment with this, Thales will upgrade the STA RADIUS server to include the Message-Authenticator attribute in all RADIUS responses and challenges.

 

Details for CP products are found in sk182516: Check Point Response to CVE-2024-3596 - Blast-RADIUS attack

 

Still, there might be an issue during communication, see sk183244: RADIUS authentication fails after installing Jumbo Hotfix Accumulator

CCSP - CCSE / CCTE / CTPS / CCME / CCSM Elite / SMB Specialist
0 Kudos
2 Replies
Martin_Valenta
Advisor

anyone from CP can say how it will be with Gaia Embedded ?

0 Kudos
G_W_Albrecht
Legend Legend
Legend

Done in sk182516: 

For versions that do not contain the hotfix yet, or if you choose not to upgrade, follow one of these mitigations:

  • Use other and more secured authentication protocols, such as SAML or LDAPS.
    or
  • If RADIUS authentication is still required, then as a best practice:
    1. The RADIUS server should be on an isolated internal network with Anti-Spoofing enabled.
    2. Follow the "Solution" steps in sk42184 to ignore the RADIUS attribute 80.
CCSP - CCSE / CCTE / CTPS / CCME / CCSM Elite / SMB Specialist
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events