Advisory

Cisco reports products vulnerable to "blastRadius" RADIUS protocol flaw

Take action: Time to start reviewing your RADIUS implementation in Cisco devices. If any RADIUS authentication is internet accessible, either move it to TLS/TCP or patch your systems. Ideally, the patching is the better long term approach since it doesn't slow down RADIUS by moving it to TCP protocol. But since patching is not an easy process, this is a team decision.


Learn More

Cisco is reporing that a number of their products are vulnerable to a vulnerability in the Remote Authentication Dial-In User Service (RADIUS) protocol, tracked as CVE-2024-3596 (CVSS score 9.0).

Known as "BlastRADIUS," this vulnerability allows an on-path attacker to forge RADIUS responses, potentially leading to unauthorized access to network resources.

Cisco has identified several vulnerable products across various categories:

Product Cisco Bug ID
Network and Content Security Devices
Adaptive Security Appliance (ASA) CSCwk71992
Firepower Device Manager (FDM) CSCwk69454
Firepower Management Center (FMC) Software CSCwk71817
Firepower Threat Defense (FTD) Software CSCwk67902
Identity Services Engine (ISE) CSCwk67747
Secure Email Gateway CSCwk70832
Secure Email and Web Manager CSCwk70833
Secure Firewall CSCwk67859
Secure Network Analytics CSCwk73619
Secure Web Appliance CSCwk70834
Network Management and Provisioning
Application Policy Infrastructure Controller (APIC) CSCwk70836
Crosswork Change Automation CSCwk70850
Nexus Dashboard, formerly Application Services Engine CSCwk70840
Routing and Switching - Enterprise and Service Provider
ASR 5000 Series Routers CSCwk70831
Catalyst SD-WAN Controller, formerly SD-WAN vSmart CSCwk70854
Catalyst SD-WAN Manager, formerly SD-WAN vManage CSCwk70854
Catalyst SD-WAN Validator, formerly SD-WAN vBond CSCwk70854
GGSN Gateway GPRS Support Node CSCwk70831
IOS XE Software CSCwk70852
IOS XR CSCwk70236
IOx Fog Director CSCwk70851
MDS 9000 Series Multilayer Switches CSCwk70837
Nexus 3000 Series Switches CSCwk70839
Nexus 7000 Series Switches CSCwk70838
Nexus 9000 Series Switches in standalone NX-OS mode CSCwk70839
PGW Packet Data Network Gateway CSCwk70831
SD-WAN vEdge Routers CSCwk70854
System Architecture Evolution (SAE) Gateway CSCwk70831
Ultra Packet Core CSCwk70831
Unified Computing
UCS Central Software CSCwk71967
UCS Manager CSCwk70842

Several Cisco products are confirmed not to be affected, including certain wireless access points, DNA Spaces Connector, and UCS B-Series Blade Servers.

Full advisory details here

Cisco recommends the following measures to protect against this vulnerability:

  • Use TLS or DTLS Encryption: Configure RADIUS clients and servers to use DTLS or TLS over TCP to prevent exploitation.
  • Network Isolation: Isolate RADIUS resources from untrusted sources using secure VPN tunnels and network segmentation.
  • Software Updates: Regularly check for and apply software updates and patches.

There are no workarounds available for this vulnerability. Cisco urges network administrators to review their RADIUS configurations and apply recommended mitigations promptly.

Cisco's Product Security Incident Response Team (PSIRT) is actively investigating the impact on its product line and has acknowledged the existence of proof-of-concept exploit code. However, there are no reports of malicious exploitation in the wild as of now.

Cisco reports products vulnerable to "blastRadius" RADIUS protocol flaw