RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024
Summary 
On July 7, 2024, security researchers disclosed the following vulnerability in the RADIUS protocol and assigned a CVSS base score of 8.1, CVE-2024-3596. This vulnerability may impact any RADIUS client and server. For a full description and list of affected Cisco products, please see the Cisco Security Advisory here.
CVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
The Cisco Security Advisory was first published on July 10. This article will focus on the impact on Meraki products.
Vulnerability Information
An attacker with access to the network segment where the RADIUS protocol messages are transmitted can spoof a UDP-based RADIUS Response packet to modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response, with almost any content, completely under the attacker’s control. This allows the attacker to transform a Reject into an Accept without knowledge of the shared secret between the RADIUS client and server. The attack is possible due to a basic flaw in the RADIUS protocol specification that uses an MD5 hash to verify the response.
Scope
Affected Cisco Meraki Products:
Product | Details |
---|---|
Meraki Splash Service when using customer hosted RADIUS |
The connection between Meraki’s Splash service and the customer’s RADIUS server IS VULNERABLE, as it both uses PAP and also does not require Message-Authenticator attributes to be used. |
MX |
Features: AnyConnect Client VPN, L2TP Client VPN
|
Impact
The bug described by CVE-2024-3596 could allow a malicious party sitting on the network path between the customer-owned RADIUS Server and the Splash service could have an attacker gain access to the network without possessing valid authentication credentials, and the same is true between the MX device and the customer-owned RADIUS server. An unauthorized attacker could gain access to a protected network for their clients and devices.
Fix Information
Please see the table below for information on the affected products:
Product Line | Fixed Releases |
---|---|
Meraki Splash Service when using customer hosted RADIUS |
Firmware upgrade is not required to support Message-Authenticator attribute. Fix not deployed as of July 30, 2024 |
MX |
Firmware upgrade required to support Message-Authenticator attribute for Client VPN. Fixed Versions:
For MX models with a maximum version of 18.1, a patch for version 18.1 will be available later this year. For further details on firmware restrictions by model, please refer to this KB article, Product Firmware Version Restrictions |
Mitigation
To mitigate this issue it is important to use the message authenticator RADIUS attribute and secure the network path between the Authenticator (e.g. MX) and the RADIUS Server. Potential mitigation steps will vary depending on the network path between the Authenticator and RADIUS Server.
Customers should determine the applicability and effectiveness of this mitigation in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.
Secure Practice Examples
-
If the RADIUS Server is on the same LAN as the Authenticator, implementing secure network practices such as port authentication, VLANs that separate users from management traffic, Firewall rules that restrict user traffic, and other secure practices can help reduce the attack surface on the LAN.
-
If the RADIUS Server is remote from the Authenticator, implementing secure technologies like VPN encryption between the Authenticator and RADIUS Server can help prevent attacks by an on-path attacker
Solution
To mitigate this vulnerability, the MX now supports the RADIUS attribute "Message-Authenticator". This can be enabled on the Client VPN page under the RADIUS configuration sections. Once enabled the MX will include and require this attribute in its RADIUS communications. As a result, the RADIUS server's response must also contain the "Message-Authenticator" attribute to ensure authenticity.
How do I enable the Message-Authenticator attribute for Client VPN on the MX?
Warning: If you enable the Message-Authenticator verification and the attribute is missing from the RADIUS replies, the MX will not process these responses, which may affect connectivity. Ensure your RADIUS server includes the Message-Authenticator attribute to maintain operations.
1. Upgrade the MX Firmware
- Ensure your MX device is running a supported firmware version, such as 18.211.5.1 or 19.1.7.1.
2. Configure Client VPN
- Navigate to Security & SD-WAN > Client VPN
- Click on the type of Client VPN you are using (L2TP and/or AnyConnect)
- Enable the option, "RADIUS message-authenticator verification" (see screenshots below)
- Save
L2TP | AnyConnect |
![]() |
![]() |
Please note that if you are not using a supported firmware version, the configuration option will not appear in the Meraki Dashboard.
FAQ
Is Cisco Meraki aware of any exploitation or public discussion of this vulnerability?
Cisco Meraki PSIRT is aware that public proof-of-concept code is available, but is not aware of any malicious use of the vulnerability that is described in this advisory.
How was this vulnerability found?
A vulnerability in the verification of RADIUS Response from a RADIUS server has been disclosed by a team of researchers from UC San Diego and their partners.
How complex is it to execute this exploit?
The Common Vulnerability Scoring System (CVSS) base score for this vulnerability has an attack complexity of High. It is important to note that it is not possible to exploit this vulnerability from a fully remote location; a malicious attacker would need to place their device within the network path of a RADIUS Server and Authenticator to exploit this vulnerability.
How can I upgrade my firmware to a fixed release?
Customers can use the Firmware Upgrade Tool to schedule firmware upgrades. We have a document detailing the steps here.
Are there any devices that will not have the fix available?
Cisco Meraki devices that support the releases mentioned in this article can be upgraded to a version which support the message authenticator AVP. However, some models do not support versions 18.1 or later. For detailed information, please refer to the KB article on Product Firmware Version Restrictions
Are Radius Proxy workflows impacted?
No, this service uses EAP between Meraki nodes and the Meraki Cloud and is not vulnerable.
Are networks using Meraki authentication impacted?
No, this is an encrypted tunnel to the Meraki Cloud and is not vulnerable.
Are there any MFA services that require the message-authenticator attribute?
Yes, some services such as Okta require the message-authenticator attribute on specific versions. Please refer to your providers documentation for details and requirements