Check Point Reference: | CPAI-2014-1240 |
Date Published: | 31 Mar 2014 |
Severity: | High |
Last Updated: | Monday 31 March, 2014 |
Source: | |
Industry Reference: | CVE-2009-3677 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | An elevation of privilege vulnerability has been reported in the Internet Authentication Service. Internet Authentication Service (IAS) is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server and proxy. As a RADIUS server, IAS performs centralized connection authentication, authorization, and accounting for many types of network access. A remote attacker may exploit this issue to gain access to network resources under the privileges of a specific authorized user. . The vulnerability is due to an error in the Internet Authentication Service that fails to correctly validate MS-CHAP v2 authentication requests. This causes the server to consider the authentication request as valid, even when incorrect credentials may have been provided. A remote attacker might trigger this issue by sending an incorrectly formed MS-CHAP v2 authentication request to the Internet Authentication Service, causing the attacker to obtain access to network resources under the privileges of a specific authorized user. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Authentication Protocols Violation.
Attack Information: Microsoft Internet Authentication Service MS-CHAP Security Bypass (MS09-071) - Ver2