OpenSSL Flaw Discovered

Still recovering from Heartbleed, we heard of yet another OpenSSL flaw that was reported yesterday. The “SSL/TLS MITM” vulnerability allows a user to interfere with the “handshake” between a client and server, essentially disrupting web traffic encryption.

What The OpenSSL Flaw Means

In exploiting this OpenSSL flaw, a malicious user decrypts and modifies information flowing between client and server. Communication that appears to be over a private connection is actually directly controlled by the intruder. This form of active eavesdropping is known as a “man-in-the-middle” (MITM) attack.

Similar to Heartbleed, this newly found bug has been putting computers at risk for almost 15 years. However, the SSL/TLS MITM vulnerability is not as severe as Heartbleed in that exploits are more difficult to carry out and the effects are not as earth-shattering. Exploits target single connections and are accomplished only when the malicious user can successfully authenticate both client and server.

Non-OpenSSL clients are not affected by the SSL/TLS MITM flaw. Browsers IE, Firefox, Chrome (on Desktop and iOS), and Safari are not vulnerable. However, OpenSSL clients have been advised to update to the latest version as soon as possible: https://www.openssl.org/.

More To Explore

Share This Post

Post

Biometrics Authentication and Passwords

Identity authentication has traditionally been accomplished via passwords. However, users do not always comply with suggested best practices for password creation and management, leaving devices

Post

The Best Technology Doesn’t Always Win

Within all levels of an organization, teamwork is critical in getting the job done. When co-workers have effective working relationships with one another, productivity increases,

Connect with Dara Security

Thank you for your interest in Dara Security. We look forward to helping you secure your data and achieve compliance.

© Dara Security 2024

Scroll to Top
small_popup

Secure Your Data...

Schedule your free consultation