Get the inside scoop with LoginTC and learn about relevant security news and insights.
October 23, 2025 •

Last year, a significant vulnerability known as Blast-RADIUS exposed a critical flaw in the RADIUS authentication protocol that many organizations still rely on to connect their VPNs, firewalls, and network devices. The issue highlighted the inherent weaknesses in traditional RADIUS traffic, which, by default, does not encrypt all communications.
At LoginTC, our immediate response to Blast-RADIUS included a comprehensive review of our RADIUS Connector and clear guidance to customers on mitigating risks. Now, we’re proud to take that one step further.
We’ve added RadSec (also known as RADIUS over TLS) support to the LoginTC RADIUS Connector, introducing full TLS encryption for RADIUS traffic. This marks a major step toward modernizing RADIUS-based authentication and helping organizations stay secure against both current and emerging network threats.
RadSec, short for “RADIUS over TLS,” is a modern extension to the RADIUS protocol that wraps all RADIUS communications in Transport Layer Security (TLS). Unlike traditional RADIUS, which typically uses UDP and only protects credentials with a shared secret, RadSec encrypts the entire communication channel, protecting user data, authentication requests, and responses from eavesdropping or tampering.
This upgrade ensures that all authentication messages between your RADIUS client (such as a VPN, firewall, or switch) and the LoginTC RADIUS Connector are fully encrypted, mutually authenticated, and integrity-checked.
The Blast-RADIUS vulnerability, disclosed in 2024, demonstrated that an attacker could exploit weaknesses in traditional RADIUS traffic to forge Access-Accept messages, essentially tricking a network device into granting access without proper credentials. The attack worked because RADIUS’s design assumed that only trusted, local networks would carry its traffic, an assumption that no longer holds true in today’s distributed environments.
While LoginTC’s RADIUS Connector and multi-factor authentication (MFA) already provided strong protection against unauthorized access, the underlying issue with RADIUS traffic encryption remained an industry-wide concern.
With RadSec, all authentication traffic between your network devices and the LoginTC RADIUS Connector is encrypted using TLS, ensuring:
These protections align directly with the recommendations issued after the Blast-RADIUS disclosure, effectively neutralizing the vulnerability and providing a more resilient foundation for secure authentication.
The LoginTC RADIUS Connector now supports RadSec (RADIUS over TLS) alongside traditional RADIUS, offering administrators flexibility and compatibility as they transition to more secure configurations.
Organizations using compatible VPNs, firewalls, and other RADIUS-speaking devices, such as those from Cisco, Fortinet, Palo Alto Networks, and others, can now configure them to use TLS-encrypted RADIUS connections.
LoginTC’s RadSec support allows you to:
The update requires minimal configuration changes for most environments and is available immediately for customers running the latest version of the LoginTC RADIUS Connector.
For many organizations, RADIUS remains a central part of secure network access. It’s how VPNs authenticate remote workers, how firewalls control administrative logins, and how switches and Wi-Fi controllers enforce access policies. But its age has left it lagging behind modern encryption expectations.
By integrating RadSec (RADIUS over TLS) support, LoginTC is helping to bring RADIUS into alignment with contemporary security standards, ensuring that:
It’s a change that underscores our ongoing commitment to evolving LoginTC to meet the highest standards of authentication security, not just in response to new threats, but as part of a proactive vision for safer network access.
RadSec support is available now in the LoginTC RADIUS Connector. For setup instructions, compatibility notes, or to upgrade your deployment, visit our LoginTC documentation or contact our support team.