A high-severity vulnerability found within the RADIUS protocol affects the Symantec VIP Enterprise Gateway product.
What is the vulnerability?
The RADIUS protocol has a critical issue that impacts RADIUS transport over insecure networks, particularly using RADIUS over UDP or TCP.
This problem enables a man-in-the-middle attacker to forge a valid Access-Reject response to a client request that the RADIUS server has denied. In other words, the attacker can change an Access-Reject to an Access-Accept by using a malicious proxy state and altering the contents. As a result, the attacker can access protected resources and devices for which the RADIUS client authenticates.
What VIP components are affected?
The following VIP components use RADIUS and are affected:
VIP PLUGIN (Microsoft Credential Provider plugin only)
VIP PLUGINS (all other affected plugins)
VIP ENTERPRISE GATEWAY 9.9.x, 9.10.x, 9.11.x
WINDOWS:
Test in your lab before implementing in a production environment:
LINUX:
Test in your lab before implementing in a production environment:
2 options will appear in the Validation Server settings: compatible and compliant:
What is the RADIUS Message-Authenticator attribute?
Message-Authenticator is a Type 80 RADIUS attribute that provides integrity and authenticity to RADIUS flows between the RADIUS client and server to prevent spoofing. This attribute value is an HMAC-MD5 digest (Type, Identifier, Length, Request Authenticator, Attributes) of the entire RADIUS packet with the RADIUS shared secret as the key.
To address the vulnerability, the Message-Authenticator transactions are reciprocal:
When both the client and server are properly patched, the received RADIUS packet will be discarded if the Message-Authenticator attribute is missing,
Considerations when applying the VIP EGW patch
The key to a successful upgrade will be to assess the applications (RADIUS clients) that rely upon VIP Enterprise Gateway (RADIUS server). Ideally, these clients are robust applications that fail gracefully when they receive unfamiliar\invalid input. These need not be considered further after they're upgraded to use the Message-Authenticator attribute.
Some 'fragile' applications may be unfamiliar with the Message-Authenticator data. They fall into 2 categories:
The Enterprise Gateway can’t tell the difference between robust and fragile -- this requires testing.
A pre-patched VIP Enterprise Gateway will handle either format and produce responses without the Message-Authenticator attribute.
A post-patched VIP Enterprise Gateway will handle either format and produce consistent responses with the Message-Authenticator attribute.
If you find during testing that any of your apps cannot process one way or the other, the pre- or post-patch VIP Enterprise Gateway is there to assist in the migration.
More specifically, client apps should be upgraded before applying the VIP Enterprise Gateway patch (and continue to receive handling from a pre-patch VIP Enterprise Gateway). Any “Modern preference” apps should be upgraded after VIP EnterpriseGateway.
In the unlikely event that an app falls in both categories, it will need to rely upon one VIP Enterprise Gateway (pre-patched) before its migration and a separate (patched) one after the migration, Here, a configuration change in the middle will be necessary.
In summary, thorough testing of the RADIUS client applications that use VIP Enterprise Gateway is essential. While problems in this area are generally unlikely, the outline of tests above should help avoid a production-down situation.
IMPORTANT NOTE: If the patch has been applied to 9.9.x or 9.10.x and you later upgrade to a newer version of the VIP Enterprise Gateway, you will need to apply the patch for that version. For example, if you are currently on 9.9.2, have applied the patch for 9.9.2, and later upgrade to 9.11, you will also need to apply the 9.11 version of the patch after upgrading.