#blastradius
Hmm, is this #BlastRADIUS vulnerability? Sounds a bit like it.
June 30, 2025 at 9:47 PM
Heute besser 2 Bundesländer Abstand wegen 'Blastradius'
May 13, 2025 at 11:05 AM
I remember when I ordered from BadDragon back in the day when they sold the BlastRadius CD. And made so many fun collabs, I got sooo many toys from them.

The recent news are just depressing...
May 5, 2025 at 10:41 AM
⭐️ Join me at #M2MC March 20th ⭐️

💡Topic: how #graphs can create a detailed inventory of critical assets, identify potential #attack paths, and understand the #blastradius of any #security #incident.

🎟️ Tickets:
mc2mc.be/mc2mc-live-c...

📍 Location: Sunday Group BV
Krommebeekpark 21, 8800 Roeselare.
MC2MC Live: Cloudy with a Chance of Data (20/03/2025) - MC2MC
mc2mc.be
February 21, 2025 at 4:36 PM
Cisco reports products vulnerable to "blastRadius" RADIUS protocol flaw
Cisco reports products vulnerable to "blastRadius" RADIUS protocol flaw
Take action: Time to start reviewing your RADIUS implementation in Cisco devices. If any RADIUS authentication is internet accessible, either move it to TLS/TCP or patch your systems. Ideally, the patching is the better long term approach since it doesn't slow down RADIUS by moving it to TCP protocol. But since patching is not an easy process, this is a team decision. Learn More Cisco is reporing that a number of their products are vulnerable to a vulnerability in the Remote Authentication Dial-In User Service (RADIUS) protocol, tracked as CVE-2024-3596 (CVSS score 9.0) . Known as " BlastRADIUS ," this vulnerability allows an on-path attacker to forge RADIUS responses, potentially leading to unauthorized access to network resources. Cisco has identified several vulnerable products across various categories: Several Cisco products are confirmed not to be affected, including certain wireless access points, DNA Spaces Connector, and UCS B-Series Blade Servers. Full advisory details here Cisco recommends the following measures to protect against this vulnerability: Use TLS or DTLS Encryption: Configure RADIUS clients and servers to use DTLS or TLS over TCP to prevent exploitation. Network Isolation: Isolate RADIUS resources from untrusted sources using secure VPN tunnels and network segmentation. Software Updates: Regularly check for and apply software updates and patches. There are no workarounds available for this vulnerability. Cisco urges network administrators to review their RADIUS configurations and apply recommended mitigations promptly. Cisco's Product Security Incident Response Team (PSIRT) is actively investigating the impact on its product line and has acknowledged the existence of proof-of-concept exploit code. However, there are no reports of malicious exploitation in the wild as of now.
beyondmachines.net
July 29, 2024 at 3:16 PM
Das Sommerloch hält immer wieder Überraschungen bereit. Dieses Mal ist RADIUS kaputt. Wir greifen das Thema auf und sprechen über #BlastRADIUS. Viel Spaß dabei! #Wartungsfenster https://wartungsfenster.podigee.io/64-netzwerker-ein-leben-im-explosionsradius
Netzwerken im Explosionsradius
Das Sommerloch hält immer wieder Überraschungen bereit. Dieses Mal haben einige Sicherheitsforscher unser geliebtes RADIUS-Protokoll unter die Lupe genommen und Schwachstellen entdeckt. Wir greifen da...
wartungsfenster.podigee.io
July 17, 2024 at 6:00 AM
Palo Alto Networks Addresses BlastRADIUS Vulnerability
Palo Alto Networks Addresses BlastRADIUS Vulnerability
packetstormsecurity.com
July 11, 2024 at 2:06 PM
Hackers Use the BlastRADIUS Flaw for Man-in-the-Middle Attacks
Hackers Use the BlastRADIUS Flaw for Man-in-the-Middle Attacks
Researchers warn that BlastRADIUS, a flaw in the RADIUS network authentication protocol helps hackers conduct Man-in-the-middle (MitM) attacks.
heimdalsecurity.com
July 10, 2024 at 4:36 PM
#RADIUS, the protocol nobody thinks much about, has a critical bug. This 1990s auth standard is deeply embedded into countless bits of networking gear.

IT/DevOps staff can look forward to some canceled vacay. In #SBBlogwatch, we wonder what else is lurking to bite us. #BlastRADIUS
‘Blast-RADIUS’ Critical Bug Blows Up IT Vacation Plans
MD5 MITM Muddle: Ancient, widely used protocol has CVSS 9.0 vulnerability.
securityboulevard.com
July 10, 2024 at 3:49 PM
Articles about BlastRADIUS Attack CVE-2024-3596 (10.7.2024) https://groups.googl... #PatchManagement
July 10, 2024 at 4:50 AM
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere | #security #BlastRADIUS #netsec | arstechnica.com/security/202...
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere
Ubiquitous RADIUS scheme uses homegrown authentication based on MD5. Yup, you heard right.
arstechnica.com
July 10, 2024 at 3:33 AM
Just finished podcastin' with @BlatantHomerism in which he kept lobbing me softball questions about Tressel #plutoniumsoftballs #blastradius
December 11, 2024 at 3:53 PM