Palo Alto 安全中心 2024年07月11日
CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks发布安全警告,指出在使用RADIUS认证时,CHAP和PAP协议存在权限提升漏洞。攻击者可利用中间人攻击,绕过认证并获得超级用户权限。建议使用加密和认证通道来解决问题。

🚨 该漏洞允许攻击者在Palo Alto Networks的PAN-OS防火墙和RADIUS服务器之间执行中间人攻击,当使用RADIUS认证并选择CHAP或PAP协议时,可绕过认证并提升权限至超级用户。

💡 CHAP和PAP协议由于缺乏传输层安全(TLS)保护,容易受到中间人攻击。若要使用,应确保它们被加密隧道封装。

🛡️ 受影响的PAN-OS版本包括9.1、10.1、10.2、11.0和11.1,但已有修复版本发布。Prisma Access用户不受影响。

🔒 解决方案是使用提供现代加密安全保证的加密和认证通道。PAN-OS提供了PEAP-MSCHAPv2、PEAP with GTC和EAP-TTLS with PAP等替代RADIUS认证机制。

📝 对于尚未应用上述更改的Prisma Access用户,将安排升级窗口。PAN-OS新版本增加了强制RADIUS认证检查的功能,但默认情况下是禁用的。

Palo Alto Networks Security Advisories /CVE-2024-3596CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege EscalationUrgencyMODERATEResponse EffortMODERATERecoveryAUTOMATICValue DensityCONCENTRATEDAttack VectorNETWORKAttack ComplexityHIGHAttack RequirementsPRESENTAutomatableNOUser InteractionPASSIVEProduct ConfidentialityNONEProduct IntegrityNONEProduct AvailabilityNONEPrivileges RequiredNONESubsequent ConfidentialityHIGHSubsequent IntegrityHIGHSubsequent AvailabilityNONENVDJSON Published2024-07-10 Updated2024-07-10ReferencePAN-247511DiscoveredexternallyDescriptionThis vulnerability allows an attacker performing a meddler-in-the-middle attack between Palo Alto Networks PAN-OS firewall and a RADIUS server to bypass authentication and escalate privileges to ‘superuser’ when RADIUS authentication is in use and either CHAP or PAP is selected in the RADIUS server profile.CHAP and PAP are protocols with no Transport Layer Security (TLS), and hence vulnerable to meddler-in-the-middle attacks. Neither protocol should be used unless they are encapsulated by an encrypted tunnel. If they are in use, but are encapsulated within a TLS tunnel, they are not vulnerable to this attack.For additional information regarding this vulnerability, please see https://blastradius.fail.Product StatusVersionsAffectedUnaffectedCloud NGFW NoneAllPAN-OS 11.2NoneAllPAN-OS 11.1< 11.1.3>= 11.1.3PAN-OS 11.0< 11.0.4-h4>= 11.0.4-h4PAN-OS 10.2< 10.2.10>= 10.2.10PAN-OS 10.1< 10.1.14>= 10.1.14PAN-OS 9.1< 9.1.19>= 9.1.19Prisma Access AllNone (Fix ETA: July 30)Required Configuration for ExposureTo be vulnerable, Palo Alto Networks PAN-OS firewalls must be configured to use CHAP or PAP as the authentication protocol for a RADIUS server. Note that PAP differs from EAP-TTLS with PAP, which is not vulnerable to this attack.Severity:MEDIUMCVSSv4.0Base Score:5.3 (CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/AU:N/R:A/V:C/RE:M/U:Amber)Exploitation StatusPalo Alto Networks is aware of proof of concept code demonstrating how to exploit this generic issue.Weakness TypeCWE-290 Authentication Bypass by SpoofingSolutionThe best way to address this issue is by using encrypted and authenticated channels that offer modern cryptographic security guarantees.Configure an alternate authentication mechanism if you are using RADIUS with a CHAP or PAP authentication protocol. PAN-OS provides the following alternate RADIUS authentication mechanisms: PEAP-MSCHAPv2 (default), PEAP with GTC, and EAP-TTLS with PAP. For more information, please see https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/authentication/configure-radius-authentication.In addition, instead of using RADIUS, you can configure an alternate authentication mechanism using one of the options described here: https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/authentication.If you are a Prisma Access customer using a RADIUS configuration with PAP or CHAP in your profile and have not applied one of the changes described above, you will be contacted to schedule an upgrade window.PAN-OS 9.1.19, PAN-OS 10.1.14, PAN-OS 10.2.10, PAN-OS 11.0.7, PAN-OS 11.1.3, and all later PAN-OS versions add a new feature to enforce an authentication check in RADIUS. This new feature is disabled by default to match the existing behavior. To enable this feature, run the following commands: set auth radius-require-msg-authentic yesTo confirm that the setting was correctly enabled, run the following command: show auth radius-require-msg-authenticIf set correctly, the response will say "yes". This setting is persistent across reboots. No ‘commit’ is required for this to take effect.AcknowledgmentsPalo Alto Networks thanks Sharon Goldberg, Miro HAller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl for discovering and reporting this issue.Timeline2024-07-10Initial publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks 网络安全漏洞 RADIUS认证 权限提升
相关文章