RADIUS Protocol Vulnerability Exposes Networks to MitM Attacks
Jul 09, 2024
Vulnerability / Network Security
 Cybersecurity researchers have discovered a security vulnerability in the RADIUS  network authentication protocol called BlastRADIUS  that could be exploited by an attacker to stage Mallory-in-the-middle (MitM) attacks and bypass integrity checks under certain circumstances.  "The RADIUS protocol allows certain Access-Request messages  to have no integrity or authentication checks," InkBridge Networks CEO Alan DeKok, who is the creator of the FreeRADIUS Project , said in a statement.  "As a result, an attacker can modify these packets without detection. The attacker would be able to force any user to authenticate, and to give any authorization (VLAN, etc.) to that user."  RADIUS, short for Remote Authentication Dial-In User Service, is a client/server protocol  that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service.   The security of RADIUS is reliant on a hash  that's derived usi...