The July 2024 vulnerability discovered in the RADIUS protocol has already been patched in the upstream pam_radius 3.0.0 release (https://github.com/FreeRADIUS/pam_radius/issues/96), however the version provided both by Debian 12 upstream (2.0.0; trixie and sid both have the 3.0.0 release) and the version included in VyOS (1.5.0-cl3u7, https://github.com/vyos/vyos-1x/blob/1d419bc2b56a487527dd120d3f39d420fcb615b3/debian/control#L44C25-L44C36) have not yet applied the mitigation.
Related Resources:
FreeRADIUS Article: https://www.freeradius.org/vul_notifications/2024/07/09/blastradius.html
Debian Security Tracker (only calls out freeradius server as affected, but the trixie changelog mentions the vulnerability in the libpam-radius-auth package as well): https://security-tracker.debian.org/tracker/CVE-2024-3596