A high severity vulnerability found within the Radius protocol which the CA API Gateway can use in some instances.
What is the vulnerability?
The RADIUS protocol has a critical issue that impacts RADIUS transport over insecure networks, particularly using RADIUS over UDP or TCP.
This problem enables a man-in-the-middle attacker to forge a valid Access-Reject response to a client request that the RADIUS server has denied. In other words, the attacker can change an Access-Reject to an Access-Accept by using a malicious proxy state and altering the contents. As a result, the attacker can access protected resources and devices for which the RADIUS client authenticates.
How is the gateway affected?
Two areas of the APIM Gateway are potentially affected:
- Affected: Authenticate Against Radius Server assertion with Authentication Protocols PAP, CHAP and MS-CHAP*
- Unaffected: Authenticate Against Radius Server assertion with Authentication Protocols EAP*
- Gateway 11.0: No impact (RADIUS/RADIUS+LDAP Authentication Schemes are disabled)
- Gateway 11.1: This concerns whoever configures the RADIUS or RADIUS+LDAP Authentication Scheme for SSH login to the Gateway.
CA API Gateway 11.x
How to mitigate?
1. Authenticate Against Radius Server Assertion
The gateway acts as a RADIUS client. According to RFC 3579 (https://datatracker.ietf.org/doc/html/rfc3579#section-3.2), when the Authentication Protocol is EAP*, the client is required to send and verify a Message-Authenticator attribute. We recommend that customers use the "Authenticate Against Radius Server" assertion with Authentication Protocols EAP* as noted in our documentation.
2. SSH login to Gateway VM with RADIUS/RADIUS+LDAP Authentication Scheme
We are advising customers to use alternative authentication methods to the gateway at this time.
We have created the following patch for gateway 11.1 : Layer7_API_SSG_Platform_Update_64bit_v11.1.1-1630-Debian.L7P
You can download the patch here.
Applying this patch is optional and the vulnerability can be mitigated by simply configuring another authentication method other then Radius/Radius+LDAP.
Once this patch is applied RADIUS/RADIUS+LDAP authentication via ssh to the gateway will be disabled.
For further details on how you can disable/enable Radius/LDAP+Radius authentication once the patch is applied please review our documentation.
Please note that the CA API Developer Portal and CA Mobile API Gateway are not impacted by this vulnerability as they do not make use of RADIUS.