Critical Vulnerability Found in RADIUS Protocol Used in Global Networks
The Blast-RADIUS attack exploits an MD5-based flaw, affecting numerous devices and requiring urgent security updates.
- Researchers discovered a vulnerability in the RADIUS protocol, rated 7.5 on the CVSS scale.
- The flaw allows attackers to bypass authentication via man-in-the-middle attacks using MD5 collision techniques.
- Affected devices include routers, switches, and industrial controllers across various sectors.
- Vendors have released patches and recommend upgrading to RADIUS over TLS for better security.
- The attack requires partial network access and sophisticated methods, making it challenging but feasible for well-resourced adversaries.