<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RADIUS Protocol Vulnerability in Threats</title>
    <link>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/72057#M1253</link>
    <description>&lt;P&gt;a lot of people are still using it since it is free inside windows server&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jul 2024 01:59:34 GMT</pubDate>
    <dc:creator>Bec</dc:creator>
    <dc:date>2024-07-17T01:59:34Z</dc:date>
    <item>
      <title>RADIUS Protocol Vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/71963#M1250</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The Remote Authentication Dial-In User Service, or RADIUS, network protocol is vulnerable to forgery attacks. The cybersecurity experts who detected the vulnerability have devised Blast-RADIUS, an “attack [that] allows a man-in-the-middle attacker to authenticate itself to a device using RADIUS for user authentication, or to assign itself arbitrary network privileges.” RADIUS is ubiquitous, so the vulnerability affects most networking devices. The researchers recommend that RADIUS/UP be deprecated. Short of that, suggested mitigations include transitioning to RADIUS over TLS, isolating RADIUS traffic, and watching for updates and applying them when they are available.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.theregister.com/2024/07/10/radius_critical_vulnerability/?is=2e17210a000df3b23714ee0b7fabf90d53a139a7fd871f741a8f77fe7ad94a1a" target="_blank"&gt;https://www.theregister.com/2024/07/10/radius_critical_vulnerability/?is=2e17210a000df3b23714ee0b7fabf90d53a139a7fd871f741a8f77fe7ad94a1a&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596?is=2e17210a000df3b23714ee0b7fabf90d53a139a7fd871f741a8f77fe7ad94a1a" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-3596?is=2e17210a000df3b23714ee0b7fabf90d53a139a7fd871f741a8f77fe7ad94a1a&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jul 2024 05:26:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/71963#M1250</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-07-14T05:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Protocol Vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/71989#M1252</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/604565541"&gt;@Kyaw_Myo_Oo&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I wonder how many organisations still use RADIUS these days, really antiquated protocol these days.&amp;nbsp; There are many replacements available including Cisco TACACS+&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jul 2024 22:37:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/71989#M1252</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-14T22:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Protocol Vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/72057#M1253</link>
      <description>&lt;P&gt;a lot of people are still using it since it is free inside windows server&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 01:59:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/72057#M1253</guid>
      <dc:creator>Bec</dc:creator>
      <dc:date>2024-07-17T01:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Protocol Vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/72099#M1254</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1375678493"&gt;@Bec&lt;/a&gt;Free may not be secure, but then they take the risk, and pay the consequences if Murphy's law descends upon them.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 20:28:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/72099#M1254</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-17T20:28:59Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Protocol Vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/72179#M1262</link>
      <description>&lt;P&gt;Thanks for sharing your thoughts and views&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 08:31:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/72179#M1262</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-07-19T08:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Protocol Vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/72180#M1263</link>
      <description>&lt;P&gt;Thanks for sharing your thoughts and views&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1375678493"&gt;@Bec&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 08:31:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/RADIUS-Protocol-Vulnerability/m-p/72180#M1263</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-07-19T08:31:43Z</dc:date>
    </item>
  </channel>
</rss>

