- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
I have an open TAC case, but I figured I would do some crowd sourcing while I wait.
Upgraded from R81.20 JHF 89 -> 99 (Recommended). Users can no longer connect using the Check Point Mobile VPN. I am testing with version E88.62 on Windows 11 23H2. Our users authenticate against our internal Imprivata server for MFA. I get prompted to "Accept" MFA 3 times before it stops and Check Point says, "invalid username or password".
When I perform "tcpdump -nni any port 1812", I am seeing good traffic.
I see some stuff addressed for the BLAST CVE and that is where I thought my issue was, but it doesn't appear to be.
I am NOT ignoring Radius attribute 80. sk42184
I applied the Remote Access VPN regedit as well. sk182516
I do see the Message Authenticator field in the replies.
Thoughts? Anyone else seeing this?
The fix is:
The other solution would be to get your RADIUS vendor to send back the Message-Authenticator as AVP #1. I am still trying to get this accomplished with Imprivata, but no updates yet. I do not wish to manage this hotfix for the rest of my life.
I am under the impression that Microsoft NPS and some Linux flavors send Message-Authenticator as AVP #1, so I'm not sure if Imprivata is the only vendor not doing this. The fix for BLAST has been publicly available since November from Check Point, and we have been the only ticket our engineer has delt with where the RADIUS vendor is not sending the Message-Authenticator as AVP #1, but if you are using Imprivata, be aware of this. Based on that, it seems unlikely Check Point is going to change the behavior, but you never know.
Saw someone else post about this too...affecting every user I assume?
Andy
Yeah it's for all users.
So tcpdump just shows auth error? What did TAC say?
I see valid accept / pass messages in the tcpdump, I am gathering debugs for TAC.
Sounds good, let us know how it gets solved.
Andy
I was hoping for a better answer, but here is what is going on. This is Blast-RADIUS related. sk183244
Basically, our RADIUS server, Imprivata, is not sending the AVP Message-Authenticator back first. Check Point is requiring that the Message-Authenticator AVP is listed first in the response, since it is not first, we get the failure. We have a ticket open with Imprivata, and they are investigating the issue, so it sounds like we are not the first ticket on this.
Here are pictures explaining the issue. You can see in the Access-Request, Message-Authenticator is AVP #1, in Access-Accept it is AVP #3, which to Check Point is bad.
Per the SK I linked, it sounds like there is a patch that changes the behavior, but that hotfix is currently only available for JHF-96,98. Nothing for JHF-99 yet.
So, it seems like I am still stuck running JHF-89 for the foreseeable future.
da*n..nothing in 101?
Hey mate,
Any news from TAC?
Andy
Hey,
any news from TAC, bcz we are planning to upgrade our JHF 92 to 99, and our more users are connecting through VPN, so if we face this issue then big challenges for us.
If you are on JHF-92, you should be fine. I am running JHF-89 which never included the fixed for CVE-2024-3596, it was added in JHF-90.
You can validate your current setup, just do a packet capture of a authentication on the gateway and look at the RADIUS packets:
tcpdump -nni any port 1812 -w radiuscap.pcap
Open the .pcap in wireshark and look at the "Access-Accept" packet, under the RADIUS protocol in the Attribute Value Pairs section, as long as the Message-Authenticator is #1 you are in the clear. I reference this in a screenshot above.
The fix is:
The other solution would be to get your RADIUS vendor to send back the Message-Authenticator as AVP #1. I am still trying to get this accomplished with Imprivata, but no updates yet. I do not wish to manage this hotfix for the rest of my life.
I am under the impression that Microsoft NPS and some Linux flavors send Message-Authenticator as AVP #1, so I'm not sure if Imprivata is the only vendor not doing this. The fix for BLAST has been publicly available since November from Check Point, and we have been the only ticket our engineer has delt with where the RADIUS vendor is not sending the Message-Authenticator as AVP #1, but if you are using Imprivata, be aware of this. Based on that, it seems unlikely Check Point is going to change the behavior, but you never know.
Tx for letting us know!
Andy
Update from TAC:
I guess they are going to change the behavior, nice.
So probably take that comes after 101?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
9 | |
6 | |
5 | |
5 | |
4 | |
3 | |
3 | |
2 | |
2 |
Wed 03 Sep 2025 @ 11:00 AM (SGT)
Deep Dive APAC: Troubleshooting 101 for Quantum Security GatewaysThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksWed 03 Sep 2025 @ 11:00 AM (SGT)
Deep Dive APAC: Troubleshooting 101 for Quantum Security GatewaysThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY