Sunday, August 17, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Mathematics

Computer scientists discover vulnerabilities in a popular security protocol

August 20, 2024
in Mathematics
Reading Time: 3 mins read
0
Blast-RADIUS attack flow.
68
SHARES
616
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT

A widely used security protocol that dates back to the days of dial-up Internet has vulnerabilities that could expose large numbers of networked devices to an attack and allow an attacker to gain control of traffic on an organization’s network.

Blast-RADIUS attack flow.

Credit: NA

ADVERTISEMENT

A widely used security protocol that dates back to the days of dial-up Internet has vulnerabilities that could expose large numbers of networked devices to an attack and allow an attacker to gain control of traffic on an organization’s network.

A research team led by University of California San Diego computer scientists investigated the Remote Authentication Dial-In User Service (RADIUS) protocol and found a vulnerability they call Blast-RADIUS that has been present for decades. RADIUS, designed in 1991, allows networked devices such as routers, switches or mobile roaming gear to use a remote server to validate login or other credentials. 

This is a common set-up in enterprise and telecommunications networks because it allows credentials to be centrally managed. As a result, RADIUS is a critical part of modern telecommunications and enterprise networks; in large enterprises, it may control access to tens of thousands of switches. 

Authors of the paper “RADIUS/UDP Considered Harmful” include researchers from Cloudfare, Centrum Wiskunde & Informatica, BastiionZero and Microsoft Research. It was presented last week at the USENIX Security 2024 conference. 

“This is among the largest and most complex vulnerability disclosure processes that we have been involved in, “ said Nadia Heninger, a professor in the Jacobs School of Engineering Department of Computer Science and Engineering. “Given how widely this protocol is used, it is surprising that it has received almost no formal security analysis in the academic cryptography and security communities.”

Heninger notes the large gap that existed between those who deploy these protocols and those who study them. 

The researchers discovered the ability for a “man in the middle” to attack communication between a RADIUS client (or the victim’s networked device) and RADIUS server to forge a valid protocol accept message in response to a fake login or authentication request. This could give an attacker administrative access to networked devices and services without requiring an attacker to guess or “brute force” passwords. 

The root of this vulnerability stems from the fact RADIUS was developed before proper cryptographic protocol design was well understood, the authors say. It uses an authentication check based on an ad hoc and insecure construction based on the MD5 hash function, which has been known to be broken for two decades.

However, the RADIUS protocol was not updated when MD5 was broken in 2004, the authors note. Before their work, the maintainers of the protocol standards defining RADIUS thought that the MD5-based construction used in RADIUS was still secure. 

Vendors have released patches that implement the authors’ recommended short-term mitigation for this vulnerability. System administrators should check for patches for protocols they use with RADIUS and apply the updated configuration options suggested by their vendors. 

The authors have disclosed their findings (security advisories CVE-2024-3596 and VU#456537) and more than 90 vendors have been involved in a coordinated disclosure and issued security bulletins. 

The research team includes Heninger, Miro Haller and Adam Suhl of UC San DIego; Sharon Goldberg of Cloudfare; Mike Milano of BastionZero; Dan Shumow of Microsoft Research; and Marc Stevens of Centrum Wiskunde & Informatica. 

 



Share27Tweet17
Previous Post

AI can help rule out abnormal pathology on chest x-rays

Next Post

Inhaler misuse leads to mismanagement of COPD symptoms, increased exacerbations

Related Posts

blank
Mathematics

Students’ Imaging Tool Enables Sharper Detection, Earlier Warnings from Lab to Space

August 15, 2025
blank
Mathematics

Meta-Analysis Suggests Helicobacter pylori Eradication Could Increase Risk of Reflux Esophagitis

August 14, 2025
blank
Mathematics

Innovative Few-Shot Learning Model Boosts Accuracy in Crop Disease Detection

August 13, 2025
blank
Mathematics

Scientists Unveil Mathematical Model Explaining ‘Matrix Tides’ and Complex Wave Patterns in Qiantang River

August 12, 2025
blank
Mathematics

Enhancing Medical Imaging with Advanced Pixel-Particle Analogies

August 12, 2025
blank
Mathematics

Brain-Inspired Devices Become Reality Through Neuromorphic Technology and Machine Learning

August 12, 2025
Next Post
Inhaler misuse leads to mismanagement of COPD symptoms, increased exacerbations

Inhaler misuse leads to mismanagement of COPD symptoms, increased exacerbations

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27535 shares
    Share 11011 Tweet 6882
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    948 shares
    Share 379 Tweet 237
  • Bee body mass, pathogens and local climate influence heat tolerance

    641 shares
    Share 256 Tweet 160
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    507 shares
    Share 203 Tweet 127
  • Warm seawater speeding up melting of ‘Doomsday Glacier,’ scientists warn

    311 shares
    Share 124 Tweet 78
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • New Metabolic Inflammation Model Explains Teen Reproductive Issues
  • Compulsive Shopping, Family, and Fashion in Female Students
  • Mpox Virus Impact in SIVmac239-Infected Macaques
  • Epigenetic Mechanisms Shaping Thyroid Cancer Therapy

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Success! An email was just sent to confirm your subscription. Please find the email now and click 'Confirm Follow' to start subscribing.

Join 4,859 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine