Blast-RADIUS vulnerability

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2024-030 CVE-2024-3596 07/10/2024 medium v1

Vulnerability details

RADIUS Protocol under RFC 2865, which is used on SNS, is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

Impacted products

ProductsSeverityDetail
Stormshield Network Security medium SNS is impacted

Revisions

Version Date Description
v1 09/24/2024 Initial release


Stormshield Network Security

CVSS v3.1 Overall Score: 5.5      

Analysis

Impacted version

RADIUS Protocol under RFC 2865, which is used on SNS, is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

  • SNS 3.7.0 to 3.7.42
  • SNS 3.10.0 to 3.11.30
  • SNS 4.0.0 to 4.3.29
  • SNS 4.4.0 to 4.7.8
  • SNS 4.8.0 to 4.8.2

Workaround solution

Solution

There is no workaround solution.

The following SNS versions will fix this vulnerability:

  • 4.3.30
  • 4.7.9
  • 4.8.3

Please note that these firmware versions adds two configuration tokens that are enabled by default:
MsgAuthenticatorSend=1 # if enabled, send the message-authenticator attribute in client requests
MsgAuthenticatorRequired=1 # if enabled, reject any server response that doesn’t contain a message-authenticator attribute

These modifications may have an impact on your Radius authentication politics.

To change the default configuration via CLI commands:
CONFIG.AUTH.RADIUS MsgAuthenticatorSend=0
CONFIG.AUTH.RADIUS MsgAuthenticatorRequired=0

To show current configuration:
CONFIG.AUTH.SHOW



Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Adjacent Network High None None Changed High None None
CVSS Base score: 6.1 CVSS Vector: (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N)
Exploit Code Maturity Remediation Level Report Confidence
Proof of concept code Official fix Confirmed
CVSS Temporal score: 5.5 CVSS Vector: (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C)
Confidentiality Requirement Integrity Requirement Availability Requirement
Medium Low Low
CVSS Environmental score: 5.5 CVSS Vector: (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C/CR:M/IR:L/AR:L/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)