Описание
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.
Отчет
This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption. There are several preconditions for this attack to be possible:
- An attacker needs man-in-the-middle network access between the RADIUS client and server
- The client and server must be using RADIUS/UDP to communicate
- The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication) Due to these attack surface limitations, the impact is rated Important. Within Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.
Меры по смягчению последствий
Disable the use of RADIUS/UDP and RADIUS/TCP. RADIUS/TLS or RADIUS/DTLS should be used.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | freeradius | Out of support scope | ||
Red Hat Enterprise Linux 7 Extended Lifecycle Support | freeradius | Fixed | RHSA-2024:4911 | 30.07.2024 |
Red Hat Enterprise Linux 7 Extended Lifecycle Support | krb5 | Fixed | RHSA-2024:8788 | 04.11.2024 |
Red Hat Enterprise Linux 8 | freeradius | Fixed | RHSA-2024:4936 | 31.07.2024 |
Red Hat Enterprise Linux 8 | krb5 | Fixed | RHSA-2024:8860 | 05.11.2024 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | freeradius | Fixed | RHSA-2024:4913 | 30.07.2024 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | krb5 | Fixed | RHSA-2024:8789 | 04.11.2024 |
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | freeradius | Fixed | RHSA-2024:4874 | 25.07.2024 |
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | krb5 | Fixed | RHSA-2024:8791 | 04.11.2024 |
Red Hat Enterprise Linux 8.4 Telecommunications Update Service | freeradius | Fixed | RHSA-2024:4874 | 25.07.2024 |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
9 Critical
CVSS3
Связанные уязвимости
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a ...
9 Critical
CVSS3