Siemens SCALANCE, RUGGEDCOM
CVE-2024-3596 (Blastradius) is a vulnerability in the RADIUS protocol implementation affecting Siemens SCALANCE, RUGGEDCOM, and related industrial networking products. An on-path attacker located between a Network Access Server (the Siemens device acting as RADIUS client) and a RADIUS server (such as SINEC INS) can forge Access-Request packets and modify corresponding server responses. This allows the attacker to convert "Access-Reject" messages into "Access-Accept" messages, granting unauthorized network access with attacker-specified authorization levels without knowing legitimate credentials. The vulnerability affects multiple product families and firmware versions; some products have been patched while others (particularly SCALANCE XR/XM/XC/SC/W series models) have no fix planned. Mitigations include restricting RADIUS traffic isolation, requiring Message-Authenticator attributes on the RADIUS server, and updating to patched firmware versions where available.
- Network position between device and RADIUS server (e.g., same VLAN or management network)
- RADIUS traffic not encrypted or integrity-protected by Message-Authenticator attribute
- Device configured to use RADIUS for authentication
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ab2e392f-0a11-4c0c-8338-0635aa0188fd