New Blast-RADIUS attack exploits 30-year-old protocol vulnerability

arstechnica.com

A new Blast-RADIUS attack exploits the 30-year-old RADIUS protocol's use of MD5 for authentication, affecting networks worldwide. RADIUS is crucial for VPNs, ISPs, Wi-Fi, cellular roaming, and more. Despite MD5's known vulnerabilities since 2004, RADIUS has not been updated. The attack allows adversaries to gain administrator access to devices. Security bulletins from 90 vendors are being issued with patches and long-term solutions in progress.


With a significance score of 4.2, this news ranks in the top 3.1% of today's 23654 analyzed articles.

Get summaries of news with significance over 5.5 (usually ~10 stories per week). Read by 10,000+ subscribers:


New Blast-RADIUS attack exploits 30-year-old protocol vulnerability | News Minimalist