Radius/UDP. How legacy protocols need to keep up with modern cryptography
Researchers found a new attack on MD5 affecting RADIUS/UDP authentication. Dubbed Blast-RADIUS, it exploits MD5 weaknesses to gain unauthorized access to network devices. Upgrading legacy protocols like RADIUS is crucial for security.
Read original articleResearchers have discovered an improved attack against the MD5 cryptographic hash function, specifically affecting the RADIUS/UDP protocol commonly used for authentication in networking environments. This attack allows a malicious actor with access to RADIUS traffic to gain unauthorized administrative access to devices using RADIUS for authentication, without the need to steal passwords or shared secrets. The vulnerability lies in the outdated cryptographic constructions based on MD5 still present in RADIUS deployments. Despite advancements in cryptography, RADIUS continues to rely on MD5, making it susceptible to exploitation. The attack, known as Blast-RADIUS, leverages weaknesses in MD5 to manipulate RADIUS messages, enabling unauthorized access to networked devices. While protocols like HMAC-MD5 offer more secure alternatives, they are often optional in RADIUS configurations. The research highlights the importance of updating legacy protocols like RADIUS to mitigate security risks posed by evolving cryptographic attacks.
Related
Confidentiality in the Face of Pervasive Surveillance
RFC 7624 addresses confidentiality threats post-2013 surveillance revelations. It defines attacker models, vulnerabilities, and encryption's role in protecting against eavesdropping, emphasizing Internet security enhancements against pervasive surveillance.
MOVEit Transfer: Auth bypass and a look at exposure
Progress Software disclosed two critical authentication bypass CVEs affecting MOVEit Transfer and Gateway products on June 25, 2024. CVE-2024-5806 was upgraded from High to Critical. Censys reported 2,700 instances concentrated in the US, emphasizing ongoing vigilance.
How MFA is falling short
Multi-factor authentication (MFA) faces challenges from cyber attackers exploiting weaknesses. Breaches despite VPN, SSO, and Google Authenticator usage show risks like phishing, vishing, and Man-In-The-Middle attacks. Recent developments include "Tycoon 2FA" targeting Microsoft 365 and Gmail accounts, emphasizing the need for stronger authentication methods.
Remote Unauthenticated Code Execution in OpenSSH Server
Qualys found regreSSHion, a critical RCE flaw in OpenSSH on glibc-based Linux systems. Over 14 million servers are at risk, with potential root access. Qualys created an exploit but delays release for patching.
Did a broken random number generator in Cuba help expose an espionage network?
A cryptologic mystery involving a broken random number generator in Cuba exposes a Russian espionage network. Anomalies in encrypted shortwave radio transmissions lead to the arrest of Russian spies, highlighting vulnerabilities in one-time pad ciphers.
Related
Confidentiality in the Face of Pervasive Surveillance
RFC 7624 addresses confidentiality threats post-2013 surveillance revelations. It defines attacker models, vulnerabilities, and encryption's role in protecting against eavesdropping, emphasizing Internet security enhancements against pervasive surveillance.
MOVEit Transfer: Auth bypass and a look at exposure
Progress Software disclosed two critical authentication bypass CVEs affecting MOVEit Transfer and Gateway products on June 25, 2024. CVE-2024-5806 was upgraded from High to Critical. Censys reported 2,700 instances concentrated in the US, emphasizing ongoing vigilance.
How MFA is falling short
Multi-factor authentication (MFA) faces challenges from cyber attackers exploiting weaknesses. Breaches despite VPN, SSO, and Google Authenticator usage show risks like phishing, vishing, and Man-In-The-Middle attacks. Recent developments include "Tycoon 2FA" targeting Microsoft 365 and Gmail accounts, emphasizing the need for stronger authentication methods.
Remote Unauthenticated Code Execution in OpenSSH Server
Qualys found regreSSHion, a critical RCE flaw in OpenSSH on glibc-based Linux systems. Over 14 million servers are at risk, with potential root access. Qualys created an exploit but delays release for patching.
Did a broken random number generator in Cuba help expose an espionage network?
A cryptologic mystery involving a broken random number generator in Cuba exposes a Russian espionage network. Anomalies in encrypted shortwave radio transmissions lead to the arrest of Russian spies, highlighting vulnerabilities in one-time pad ciphers.