Authentication Manager version 8.X how to demonstrate no increased risks in RADIUS TCP ports 1812 & 1813 reported vulnerability findings
a year ago
Originally Published: 2018-11-09
Article Number
000064265
Applies To
RSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.X all versions
Platform: null
Platform (Other): SBR RADIUS
O/S Version: Suse Linux
Product Name: null
Product Description: null
Issue
Qualys Security scan of Authentication Manager, AM servers found the following, impacting RADIUS Ports 1812 & 1813 TCP/UDP

 QID 11827 - RADIUS Port 1812 TCP/UDP HTTP Security Header Not Detected (HSTS) *
 QID 86763 - RADIUS Port 1812 - "WWW-Authenticate: Basic realm=" header field response using Readable Clear Text
 QID 86476 - RADIUS Port 1813 - Unable to complete testing since the Web server stopped responding.
 CWE-693: - Protection Mechanism Failure (https://cwe.mitre.org/data/definitions/693.html) 

Need Statement or Engineering Response from RSA on these Qualys related scans findings
Note: These http and https browser tests can be run against any version of Authentication Manager that stats with the number 8, but other vulnerabilities not listed here may necessitate your updating or upgrading your AM server version for remediation

* HSTS is not supported on RADIUS or AM console traffic, but is supported on Web Tiers that allow access to applications from the Internet
https://community.rsa.com/message/906848?commentID=906848#comment-906848  
Tasks
Test connections to AM 8.x primary/replica(s) on both 1812 and 1813, with both http and https using a browser
 1. http://<am_primary>:1812 
 2. http://<am_primary>:1813
 3. https://<am_primary>:1812
 4. https://<am_primary>:1813

Optionally obtain RADIUS admin credentials from the encrypted RSA internal database using Operations Console Credentials to successfully authenticate to the RADIUS console
Resolution
Test connections to AM 8.x primary/replica(s) on both 1812 and 1813, with both http and https using a browser, in order to demonstrate no new risks.  Newer browser versions or those with strict security settings might prevent these connections, so you may need to find an older version of a browser to run these tests, or possibly modify your browser security settings to allow these old connections.

http://<am_primary>:1812                 Result -> Console Not Supported

 1812_TCP_console_not_supported

http://<am_primary>:1813                 Result -> ERR_EMPTY_RESPONSE

 1813_TCP_ERR_EMPTY_RESPONSE

https://<am_primary>:1812                Result  -> 401 forbidden

 1812_TCP_https_401

https://<am_primary>:1813 -> Prompts for Sign In RADIUS credentials, 

 1813_TCP_https_Sign_In

Optionally you can obtain RADIUS administrative account credentials from the encrypted AM internal database using the rsautil command with Operations Console Credentials.  The rsautil commands are;
                /opt/rsa/am/utils/rsautil manage-secrets -a get com.rsa.radius.os.admin.username
                /opt/rsa/am/utils/rsautil manage-secrets -a get com.rsa.radius.os.admin.password

 RADIUS Credentials

Then you can successfully authenticate to the RADIUS console and further demonstrate no new risks are evident. But even with these credentials, you gain access to a list of RADIUS commands, but cannot see anything 'new', 

 1813_TCP_https_CommandList

When trying to access any of the commands listed you will get a variation of one of the following messages; not permitted, no style sheet for already known information like the RSA Username, or output from the local PC to a .nada file

 This server Does Not Permit

 1813_TCP_https_Radius_User_No_style_sheet

SBR_Launch_NADA

 
Notes
QID 86763 - RADIUS Port 1812 - "WWW-Authenticate: Basic realm=" header field response using Readable Clear Text can help eavesdropping and thereby compromise confidentiality.  An attacker can successfully exploit this issue when the 401 error is returned when authentication is required. Also, an attacker can find out that the Basic Authentication scheme is used using the WWW-authenticate header.

QID 86476 - RADIUS Port 1813 - Qualys reporting The service was unable to complete testing for HTTP / HTTPS vulnerabilities since the Web server stopped responding.

QID 11827 found on all Authentication Manager devices impacting RADIUS Port 1812 TCP/UDP.   (aka HSTS missing)

CWE-693: - Protection Mechanism Failure (https://cwe.mitre.org/data/definitions/693.html) - The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.  Depending on the vulnerability being exploited, an unauthenticated remote attacker could conduct cross-site scripting, clickjacking or MIME-type sniffing attacks.