• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10407
D-Link response for blast-RADIUS : CVE-2024-3596 : RADIUS Protocol under RFC 2865 is susceptible to LAN-side forgery attacks
Publication ID: SAP10407
Resolved Status: Open
Published on: 12 July 2024 2:29 GMT
Last updated on: 12 July 2024 2:39 GMT

 

 

Overview

 

On February 3, 2024, through our coordination with CERT/CC VINCE we became aware of the RADIUS Protocol under RFC2865 is vulnerable to forgery attacks.

 

D-Link Corporation recognizes the security issue and is in process of developing patches for the issue.

 

 

D-Link was aware of the  report early, the solution to mitigate this issue has taken time under the professional guidence of FreeRADIUS.  Patches were made available, however during development we found that mitigation would disable other features in the device, so we require time to develop and FULLY test for patches for our customers.

 

We will continue to update this announcement as more information is made available.

 

D-Link takes network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures.

 

Report Information  

 

         - Report by: https://www.blastradius.fail/

 
                     - Summary

 

                         The Blast-RADIUS attack allows a man-in-the-middle attacker between the RADIUS client and server to forge a valid protocol accept message in response to a failed authentication request. This forgery could give the attacker access to network devices and services without the attacker guessing or brute forcing passwords or shared secrets. The attacker does not learn user credentials.

 

Affected Models

 

             Under Development and Testing

 

 

Model

 

Software Version

 

 Region

 

Fixed Release

 

 Last Updated

 

 

 Regarding the Security Update for Your D-Link Device

 

Installing software updates is critical in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the software update, it is essential to ALWAYS validate its success by comparing the software version on your product interface to the software update version.

 

Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.

 

NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.