MGASA-2024-0264

Source
https://advisories.mageia.org/MGASA-2024-0264.html
Import Source
https://advisories.mageia.org/MGASA-2024-0264.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0264
Related
Published
2024-07-14T05:23:38Z
Modified
2024-07-14T04:58:02Z
Summary
Updated freeradius packages fix security vulnerability
Details

This vulnerability allows an attacker performing a meddler-in-the-middle attack between Palo Alto Networks PAN-OS firewall and a RADIUS server to bypass authentication and escalate privileges to ‘superuser’ when RADIUS authentication is in use and either CHAP or PAP is selected in the RADIUS server profile. CHAP and PAP are protocols with no Transport Layer Security (TLS), and hence vulnerable to meddler-in-the-middle attacks. Neither protocol should be used unless they are encapsulated by an encrypted tunnel. If they are in use, but are encapsulated within a TLS tunnel, they are not vulnerable to this attack. For additional information regarding this vulnerability, please see https://blastradius.fail. Note: these two lines are added upstream in the default radiusd.conf file: """ requiremessageauthenticator = auto limitproxystate = auto """

References
Credits

Affected packages