CVE-2024-3596 blast-radius
-
Is there a patch comming fixing CVE-2024-3596?
-
You don't need to worry if:
1- you are using EAP authentication (e.g. IPsec, 802.11x) which is not affected.
2- if the traffic never leaves the firewall (FreeRADIUS server on pfSense software, NAS/Client is on the same device)For the time being, you can set this in your radius.conf, but note that this may bring issues depending on your NAS devices freeradius implementation.
require_message_authenticator = yes limit_proxy_state = yes
Note current best practices dictate protecting RADIUS traffic by tunneling or limiting network access (e.g. using a private/secure link for RADIUS) which also limits potential exposure.
You can get more details in the following links:
https://www.freeradius.org/security/
https://www.inkbridgenetworks.com/blastradius/faq
To report vulnerabilities, go to https://www.netgate.com/security
This is not an official answer from Netgate or from freeradius, I'm just a regular user.