JumpCloud RADIUS and RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
โ07-11-2024 02:05 PM
Is the JumpCloud RADIUS server susceptible to the Blast-RADIUS attack announced this week?
- Labels:
-
Identity and Access Management
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
โ07-15-2024 12:19 PM - edited โ07-15-2024 12:24 PM
Presumably yes, as it appears that the JumpCloud RADIUS service does not currently return a Message-Authenticator as part of it's response, and I can't find any evidence that they support TLS transport of RADIUS requests (aka 'radsec' / RFC6614) either.
It does require the attacker to be able to MITM the connection between your RADIUS client device and JumpCloud, but it hopefully will still be addressed as a priority given the implications.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
โ07-15-2024 04:19 PM
We are aware of it and our teams are currently performing analysis.
Like someone's post? Give them a kudo!
Did someone's answer help you? Please mark it as a solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
โ07-30-2024 06:56 AM
Hi,
Is there an update to this, or a dedicated page to track any updates?
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
โ07-30-2024 01:15 PM
For now we just ask that you contact your account or customer success manager for updates.
Like someone's post? Give them a kudo!
Did someone's answer help you? Please mark it as a solution.
![](/skins/images/C210B62239BAF37B0AB0FAEB086BB5F1/responsive_peak/images/icon_anonymous_message.png)
![](/skins/images/C210B62239BAF37B0AB0FAEB086BB5F1/responsive_peak/images/icon_anonymous_message.png)