
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
The RADIUS Protocol under RFC 2865 is susceptible to forgery attacks known as Blast-RADIUS (CVE-2024-3596). This vulnerability allows a local attacker who can perform a man-in-the-middle attack to modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature ([BLAST], [UCSD Research], [IETF Draft]).
The vulnerability stems from RADIUS protocol's use of MD5 for authentication checks, which has been known to be cryptographically insecure since 2004. The attack combines a novel protocol vulnerability with an MD5 chosen-prefix collision attack and several speed and space improvements. An attacker can inject a malicious attribute into a request that causes a collision between the authentication information in the valid server response and the attacker's desired forgery, allowing them to turn a reject into an accept and add arbitrary protocol attributes ([BLAST], [UCSD Research]).
Successful exploitation could lead to unauthorized access to network devices and services without requiring password knowledge, bypass of Multi-Factor Authentication (MFA) systems, and privilege escalation. The vulnerability affects various applications including enterprise networks, VPN access, ISPs for DSL and FTTH, 802.1X and Wi-Fi authentication, cellular roaming, and critical infrastructure authentication ([BLAST], [Palo Alto Advisory]).
Short-term mitigation requires mandating that clients and servers always send and require Message-Authenticator attributes for all requests and responses. For Access-Accept or Access-Reject responses, the Message-Authenticator should be included as the first attribute. The long-term solution is to use RADIUS inside an encrypted and authenticated channel such as TLS that offers modern cryptographic security guarantees. Organizations should check with their vendors for patches and follow best practices for RADIUS configuration ([BLAST], [Palo Alto Advisory]).
Over 90 vendors have been involved in a coordinated disclosure and have issued security bulletins. The IETF has begun work to standardize RADIUS over (D)TLS as a long-term solution. The vulnerability has been described as one of the largest and most complex vulnerability disclosure processes, highlighting a significant gap between those who deploy these protocols and those who study them ([UCSD Research]).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”