Loading...
Loading...
Browse all stories on DeepNewz
VisitWhich mitigation strategy will be most commonly adopted to address BlastRADIUS vulnerability by end of 2024?
Updating RADIUS servers • 25%
Using TLS/IPSec • 25%
Avoiding PAP/CHAP methods • 25%
Other • 25%
Surveys and reports from cybersecurity firms and organizations
Cloudflare Discloses Critical BlastRADIUS Vulnerability in RADIUS Protocol Allowing MitM Attacks
Jul 9, 2024, 01:25 PM
Cloudflare and a team of researchers have disclosed a critical vulnerability in the RADIUS protocol, which is widely used to control administrative access to networking equipment. The vulnerability, known as BlastRADIUS, exploits the outdated use of the MD5 hash function, allowing attackers to perform Man-in-the-Middle (MitM) attacks by modifying Access-Request packets undetected and forcing user authentication. This flaw, which involves a novel chosen-prefix collision attack, can lead to unauthorized network access, compromised integrity checks, and forging authentication messages. Internet Service Providers (ISPs) and organizations are advised to update their RADIUS servers, use TLS/IPSec, and avoid PAP/CHAP methods to mitigate the risk.
View original story
Removal of Polyfill.io code • 33%
Switching to alternative services • 33%
Implementing additional security measures • 33%
Phishing • 25%
Direct network attack • 25%
Malware installation • 25%
Other • 25%
Disabling CUPS • 25%
Applying a security patch • 25%
Network segmentation • 25%
Other • 25%
Phishing attacks • 25%
Direct server exploitation • 25%
Malware distribution • 25%
Other • 25%
Patching and updating IoT devices • 25%
Replacing end-of-life equipment • 25%
Network segmentation • 25%
Other • 25%
Phishing emails • 25%
Malware • 25%
Social engineering • 25%
Other • 25%
Built-in Windows protection • 25%
Third-party software like Bitdefender • 25%
Manual backups • 25%
Other methods • 25%
Upgrade to version 1.95.8 • 25%
Switch to a different library • 25%
Implement additional security checks • 25%
Cease use of the library • 25%
Sanctions • 25%
Diplomatic measures • 25%
Cyber retaliation • 25%
Public condemnation only • 25%
Bypassing user consent • 25%
Terminal redirection • 25%
Gatekeeper bypass • 25%
Other method • 25%
Ransomware • 25%
Data theft • 25%
Denial of Service • 25%
Other • 25%
Kernel Rootkit • 25%
SSDT Hook • 25%
Infinityhook • 25%
Other • 25%
No • 50%
Yes • 50%
Yes • 50%
No • 50%
No • 50%
Yes • 50%
Comcast • 25%
Other • 25%
Verizon • 25%
AT&T • 25%