Demonstrate no increased risks in RADIUS TCP ports 1812 and 1813 reported vulnerability findings in RSA Authentication Manager 8.x
Originally Published: 2018-11-14
Article Number
Applies To
QID 86476 - RADIUS Port 1813 - Qualys reporting The service was unable to complete testing for HTTP/HTTPS vulnerabilities since the web server stopped responding.
QID 11827 - Found on all RSA Authentication Manager devices impacting RADIUS Port 1812 TCP/UDP (aka HSTS missing).
CWE-693 - Protection Mechanism Failure. The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. Depending on the vulnerability being exploited, an unauthenticated remote attacker could conduct cross-site scripting, click jacking, or MIME-type sniffing attacks.
CVE Identifier(s)
Article Summary
- QID 11827 - RADIUS Port 1812 TCP/UDP HTTP Security Header Not Detected (HSTS).
- QID 86763 - RADIUS Port 1812 - "WWW-Authenticate: Basic realm=" header field response using Readable Clear Text.
- QID 86476 - RADIUS Port 1813 - Unable to complete testing since the web server stopped responding.
- CWE-693 - Protection Mechanism Failure (https://cwe.mitre.org/data/definitions/693.html).
These http/https browser tests that are run against any RSA Authentication Manager 8.x server can demonstrate that there is nothing to exploit on TCP ports 1812 and 1813. They can serve as a Statement or Engineering Response.
Resolution
Newer browser versions or those with strict security settings might prevent these connections. You must find an older version of a browser to run these tests, or possibly modify your browser security settings to allow these old connections.
URL: http://<am_primary>:1812
Result: Console Not Supported
URL: http://<am_primary>:1813
Result: ERR_EMPTY_RESPONSE
URL: https://<am_primary>:1812
Result: 401 forbidden
URL: https://<am_primary>:1813
Result: Prompts for RADIUS sign-in credentials
- Launch an SSH client, such as PuTTY.
- Log in to the primary RSA Authentication Manager server as rsaadmin and enter the operating system password.
During Quick Setup another username may have been selected. Use that username to log in.
login as: rsaadmin Using keyboard-interactive authentication. Password: <enter operating system password> Last login: Wed Jul 24 14:09:47 2019 from jumphost.vcloud.local RSA Authentication Manager Installation Directory: /opt/rsa/am rsaadmin@am82p:~> cd /opt/rsa/am/utils rsaadmin@am82p:/opt/rsa/am/utils> ./rsautil manage-secrets -a get com.rsa.radius.os.admin.username Please enter OC Administrator username: <enter Operations Console admin user name> Please enter OC Administrator password: <enter Operations Console admin password> com.rsa.radius.os.admin.username: Radius_user_nsuo8rll rsaadmin@am82p:/opt/rsa/am/utils> ./rsautil manage-secrets -a get com.rsa.radius.os.admin.password Please enter OC Administrator username: <enter Operations Console admin user name> Please enter OC Administrator password: <enter Operations Console admin password> com.rsa.radius.os.admin.password: qnWD0fvC0ASuYxYxHqLNJIggOz5enZ rsaadmin@am82p:/opt/rsa/am/utils>
- Once you have the RADIUS_user name and com.rsa.radius.os.admin.password, paste them into the text boxes, as shown:
- Then you can successfully authenticate to the RADIUS console and further demonstrate no new risks are evident. Even with these credentials, you gain access to a list of RADIUS commands, but cannot see anything new.
- No style sheet
- Output from the local PC to a .nada file
Notes
CVE-2013-2566 - The flaw exists but is not exploitable. Tens of millions of packets must be captured (where all packets have the same plaintext, sensitive data in the same location) in order to exploit this issue. The traffic on these ports (for administration and replication) is relatively infrequent, often requiring admin intervention to start the connection and transfer. If there is more data, then more packets will be transferred with the manual operation, but the data in the packets will vary making the exploit impossible. The problem was identified with RSA RADIUS server port 1813/TCP. This is an internal port for RSA RADIUS and is NOT the standard RADIUS port 1813/UDP which is used for RADIUS accounting. Juniper and RSA document that these internal ports (port 1813/TCP and port 1812/TCP) should never be exposed to a public facing network.
CVE-2015-2808 - RC4 algorithm vulnerability, in RSA Authentication Manager 8.1: Not Exploitable
The flaw exists but is not exploitable. If a browser which requires the RC4 cipher is used for connection to the RSA Authentication Manager consoles, then RSA Authentication Manager is capable of negotiating the connection with RC4. However, the vulnerability cannot be exploited because it is impact is greatest in the first bytes encrypted with RC4 and diminishes, with the vulnerability disappearing after 100 encrypted bytes, if not sooner. The data that is passed between browsers and the RSA Authentication Manager does not include any sensitive data in the first 100 bytes of RC4 encrypted data.
CVE-2016-2183 - Sweet32, “There is only a vulnerability if customers connect to this port. If they do not connect, then an attacker cannot act as a man-in-the-middle to "poodle" the connection. Https://<am_server>:1813 does not allow real access.
Disclaimer
Related Articles
Authentication Manager version 8.X how to demonstrate no increased risks in RADIUS TCP ports 1812 & 1813 reported vulnerab… 13Number of Views Record Conflicts Issue when Auto-Generating Findings 3Number of Views How to remediate the impact of the POODLE vulnerability on RSA Endpoint 234Number of Views RSA Authentication Manager 8.1 SP1 Web Tier installation fails with "The TCP port 7030 cannot be bound for an unknown reason" 137Number of Views How to respond to Nessus reported OpenSSH Vulnerabilities against the RSA Authentication Manager 8.4 or later 184Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?