- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
I have an open TAC case, but I figured I would do some crowd sourcing while I wait.
Upgraded from R81.20 JHF 89 -> 99 (Recommended). Users can no longer connect using the Check Point Mobile VPN. I am testing with version E88.62 on Windows 11 23H2. Our users authenticate against our internal Imprivata server for MFA. I get prompted to "Accept" MFA 3 times before it stops and Check Point says, "invalid username or password".
When I perform "tcpdump -nni any port 1812", I am seeing good traffic.
I see some stuff addressed for the BLAST CVE and that is where I thought my issue was, but it doesn't appear to be.
I am NOT ignoring Radius attribute 80. sk42184
I applied the Remote Access VPN regedit as well. sk182516
I do see the Message Authenticator field in the replies.
Thoughts? Anyone else seeing this?
The fix is:
The other solution would be to get your RADIUS vendor to send back the Message-Authenticator as AVP #1. I am still trying to get this accomplished with Imprivata, but no updates yet. I do not wish to manage this hotfix for the rest of my life.
I am under the impression that Microsoft NPS and some Linux flavors send Message-Authenticator as AVP #1, so I'm not sure if Imprivata is the only vendor not doing this. The fix for BLAST has been publicly available since November from Check Point, and we have been the only ticket our engineer has delt with where the RADIUS vendor is not sending the Message-Authenticator as AVP #1, but if you are using Imprivata, be aware of this. Based on that, it seems unlikely Check Point is going to change the behavior, but you never know.
Saw someone else post about this too...affecting every user I assume?
Andy
Yeah it's for all users.
So tcpdump just shows auth error? What did TAC say?
I see valid accept / pass messages in the tcpdump, I am gathering debugs for TAC.
Sounds good, let us know how it gets solved.
Andy
I was hoping for a better answer, but here is what is going on. This is Blast-RADIUS related. sk183244
Basically, our RADIUS server, Imprivata, is not sending the AVP Message-Authenticator back first. Check Point is requiring that the Message-Authenticator AVP is listed first in the response, since it is not first, we get the failure. We have a ticket open with Imprivata, and they are investigating the issue, so it sounds like we are not the first ticket on this.
Here are pictures explaining the issue. You can see in the Access-Request, Message-Authenticator is AVP #1, in Access-Accept it is AVP #3, which to Check Point is bad.
Per the SK I linked, it sounds like there is a patch that changes the behavior, but that hotfix is currently only available for JHF-96,98. Nothing for JHF-99 yet.
So, it seems like I am still stuck running JHF-89 for the foreseeable future.
da*n..nothing in 101?
Hey mate,
Any news from TAC?
Andy
Hey,
any news from TAC, bcz we are planning to upgrade our JHF 92 to 99, and our more users are connecting through VPN, so if we face this issue then big challenges for us.
If you are on JHF-92, you should be fine. I am running JHF-89 which never included the fixed for CVE-2024-3596, it was added in JHF-90.
You can validate your current setup, just do a packet capture of a authentication on the gateway and look at the RADIUS packets:
tcpdump -nni any port 1812 -w radiuscap.pcap
Open the .pcap in wireshark and look at the "Access-Accept" packet, under the RADIUS protocol in the Attribute Value Pairs section, as long as the Message-Authenticator is #1 you are in the clear. I reference this in a screenshot above.
The fix is:
The other solution would be to get your RADIUS vendor to send back the Message-Authenticator as AVP #1. I am still trying to get this accomplished with Imprivata, but no updates yet. I do not wish to manage this hotfix for the rest of my life.
I am under the impression that Microsoft NPS and some Linux flavors send Message-Authenticator as AVP #1, so I'm not sure if Imprivata is the only vendor not doing this. The fix for BLAST has been publicly available since November from Check Point, and we have been the only ticket our engineer has delt with where the RADIUS vendor is not sending the Message-Authenticator as AVP #1, but if you are using Imprivata, be aware of this. Based on that, it seems unlikely Check Point is going to change the behavior, but you never know.
Tx for letting us know!
Andy
Update from TAC:
I guess they are going to change the behavior, nice.
So probably take that comes after 101?
Hi!
I would like to add that my client has a problem on take 105, and we see other data.
Not all users have this problem, but only some. At the same time, the problem is if you connect using an ISP, if you distribute the Internet from your phone, there are no problems.
I solved this problem using radius_ignore 80, so I think each take will have its own fix, or as indicated in the article, switch to take 111.
I have an example in attachments.
So far, I think if you upgrade to 111 and remove radius_ignore 80, the problem will disappear or not..
Or I thought about changing the registry setting as mentioned in the article. https://support.checkpoint.com/results/sk/sk182516 and remove the 80 parameter.
I will add: we have a factor 1 error in Logs and Monitor, in the iked1.elg file - RADIUS Servers Cannot Be Reached. Dropping Request
Also, the client connects and the download freezes by 47%..
I upgraded one of my clients to take 111, made radius_ignore 80, and it also freezes at 47%. I have returned radius_ignore 80 back and still get 47%.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 25 | |
| 21 | |
| 11 | |
| 9 | |
| 9 | |
| 8 | |
| 7 | |
| 7 | |
| 6 | |
| 5 |
Wed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesThu 06 Nov 2025 @ 10:00 AM (CET)
CheckMates Live BeLux: Get to Know Veriti – What It Is, What It Does, and Why It MattersTue 11 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERTue 11 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY