July 9th, 2024

Radius/UDP. How legacy protocols need to keep up with modern cryptography

Researchers found a new attack on MD5 affecting RADIUS/UDP authentication. Dubbed Blast-RADIUS, it exploits MD5 weaknesses to gain unauthorized access to network devices. Upgrading legacy protocols like RADIUS is crucial for security.

Read original articleLink Icon
Radius/UDP. How legacy protocols need to keep up with modern cryptography

Researchers have discovered an improved attack against the MD5 cryptographic hash function, specifically affecting the RADIUS/UDP protocol commonly used for authentication in networking environments. This attack allows a malicious actor with access to RADIUS traffic to gain unauthorized administrative access to devices using RADIUS for authentication, without the need to steal passwords or shared secrets. The vulnerability lies in the outdated cryptographic constructions based on MD5 still present in RADIUS deployments. Despite advancements in cryptography, RADIUS continues to rely on MD5, making it susceptible to exploitation. The attack, known as Blast-RADIUS, leverages weaknesses in MD5 to manipulate RADIUS messages, enabling unauthorized access to networked devices. While protocols like HMAC-MD5 offer more secure alternatives, they are often optional in RADIUS configurations. The research highlights the importance of updating legacy protocols like RADIUS to mitigate security risks posed by evolving cryptographic attacks.

Related

Confidentiality in the Face of Pervasive Surveillance

Confidentiality in the Face of Pervasive Surveillance

RFC 7624 addresses confidentiality threats post-2013 surveillance revelations. It defines attacker models, vulnerabilities, and encryption's role in protecting against eavesdropping, emphasizing Internet security enhancements against pervasive surveillance.

MOVEit Transfer: Auth bypass and a look at exposure

MOVEit Transfer: Auth bypass and a look at exposure

Progress Software disclosed two critical authentication bypass CVEs affecting MOVEit Transfer and Gateway products on June 25, 2024. CVE-2024-5806 was upgraded from High to Critical. Censys reported 2,700 instances concentrated in the US, emphasizing ongoing vigilance.

How MFA is falling short

How MFA is falling short

Multi-factor authentication (MFA) faces challenges from cyber attackers exploiting weaknesses. Breaches despite VPN, SSO, and Google Authenticator usage show risks like phishing, vishing, and Man-In-The-Middle attacks. Recent developments include "Tycoon 2FA" targeting Microsoft 365 and Gmail accounts, emphasizing the need for stronger authentication methods.

Remote Unauthenticated Code Execution in OpenSSH Server

Remote Unauthenticated Code Execution in OpenSSH Server

Qualys found regreSSHion, a critical RCE flaw in OpenSSH on glibc-based Linux systems. Over 14 million servers are at risk, with potential root access. Qualys created an exploit but delays release for patching.

Did a broken random number generator in Cuba help expose an espionage network?

Did a broken random number generator in Cuba help expose an espionage network?

A cryptologic mystery involving a broken random number generator in Cuba exposes a Russian espionage network. Anomalies in encrypted shortwave radio transmissions lead to the arrest of Russian spies, highlighting vulnerabilities in one-time pad ciphers.

Link Icon 2 comments
By @mm-mbs - 9 months
There is a typo in the document. It should read "RADIUS over TLS or DTLS" not "RADIUS over TLS or DLTS" (above the second image). The "DLTS" is wrong.
By @rcarmo - 9 months
Huh. Most people who care have already moved to Diameter (this is not a joke, that’s the actual name of the new protocol).