Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPA-CVE-2024-3596
HistoryJul 10, 2024 - 4:00 p.m.

PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation

2024-07-1016:00:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
5
pan-os
vulnerability
radius
authentication
privilege escalation
chap
pap
tls
meddler-in-the-middle
encrypted tunnel
workaround

AI Score

7

Confidence

Low

This vulnerability allows an attacker performing a meddler-in-the-middle attack between Palo Alto Networks PAN-OS firewall and a RADIUS server to bypass authentication and escalate privileges to ‘superuser’ when RADIUS authentication is in use and either CHAP or PAP is selected in the RADIUS server profile.

CHAP and PAP are protocols with no Transport Layer Security (TLS), and hence vulnerable to meddler-in-the-middle attacks. Neither protocol should be used unless they are encapsulated by an encrypted tunnel. If they are in use, but are encapsulated within a TLS tunnel, they are not vulnerable to this attack.

For additional information regarding this vulnerability, please see https://blastradius.fail.

Work around:
No work around available.