Lucene search

K
mageiaGentoo FoundationMGASA-2024-0264
HistoryJul 14, 2024 - 8:23 a.m.

Updated freeradius packages fix security vulnerability

2024-07-1408:23:38
Gentoo Foundation
advisories.mageia.org
53
freeradius
security
vulnerability
palo alto networks
pan-os
firewall
radius server
authentication
escalate privileges
chap
pap
tls
meddler-in-the-middle
encrypted tunnel
radiusd.conf
unix

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

10.7%

This vulnerability allows an attacker performing a meddler-in-the-middle attack between Palo Alto Networks PAN-OS firewall and a RADIUS server to bypass authentication and escalate privileges to ‘superuser’ when RADIUS authentication is in use and either CHAP or PAP is selected in the RADIUS server profile. CHAP and PAP are protocols with no Transport Layer Security (TLS), and hence vulnerable to meddler-in-the-middle attacks. Neither protocol should be used unless they are encapsulated by an encrypted tunnel. If they are in use, but are encapsulated within a TLS tunnel, they are not vulnerable to this attack. For additional information regarding this vulnerability, please see https://blastradius.fail. Note: these two lines are added upstream in the default radiusd.conf file: “”" require_message_authenticator = auto limit_proxy_state = auto “”"

OSVersionArchitecturePackageVersionFilename
Mageia9noarchfreeradius< 3.0.27-1freeradius-3.0.27-1.mga9