Schließen
Schließen
Ihr Netzwerk von morgen
Ihr Netzwerk von morgen
Planen Sie Ihren Weg zu einem schnelleren, sichereren und widerstandsfähigeren Netzwerk, das auf die von Ihnen unterstützten Anwendungen und Benutzer zugeschnitten ist.
          Erleben Sie Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            Ein führendes Unternehmen im Bereich SSE. Jetzt ein führender Anbieter von SASE.
            Ein führendes Unternehmen im Bereich SSE. Jetzt ein führender Anbieter von SASE.
            Netskope debütiert als Leader im Gartner ® Magic Quadrant ™ für Single-Vendor SASE
              Generative KI für Dummies sichern
              Generative KI für Dummies sichern
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Moderne Data Loss Prevention (DLP) für Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modernes SD-WAN für SASE Dummies-Buch
                  Modern SD-WAN for SASE Dummies
                  Hören Sie auf, mit Ihrer Netzwerkarchitektur Schritt zu halten
                    Verstehen, wo die Risiken liegen
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Die 6 überzeugendsten Anwendungsfälle für den vollständigen Ersatz älterer VPNs
                        Die 6 überzeugendsten Anwendungsfälle für den vollständigen Ersatz älterer VPNs
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive schützt sein "geistiges Eigentum" mit intelligentem und anpassungsfähigem Datenschutz
                          Colgate-Palmolive schützt sein "geistiges Eigentum" mit intelligentem und anpassungsfähigem Datenschutz
                            Netskope GovCloud
                            Netskope erhält die FedRAMP High Authorization
                            Wählen Sie Netskope GovCloud, um die Transformation Ihrer Agentur zu beschleunigen.
                              Let's Do Great Things Together
                              Die partnerorientierte Markteinführungsstrategie von Netskope ermöglicht es unseren Partnern, ihr Wachstum und ihre Rentabilität zu maximieren und gleichzeitig die Unternehmenssicherheit an neue Anforderungen anzupassen.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Technischer Support von Netskope
                                  Technischer Support von Netskope
                                  Überall auf der Welt sorgen unsere qualifizierten Support-Ingenieure mit verschiedensten Erfahrungen in den Bereichen Cloud-Sicherheit, Netzwerke, Virtualisierung, Content Delivery und Software-Entwicklung für zeitnahen und qualitativ hochwertigen technischen Support.
                                    Netskope-Video
                                    Netskope-Schulung
                                    Netskope-Schulungen helfen Ihnen, ein Experte für Cloud-Sicherheit zu werden. Wir sind hier, um Ihnen zu helfen, Ihre digitale Transformation abzusichern und das Beste aus Ihrer Cloud, dem Web und Ihren privaten Anwendungen zu machen.

                                      OpenSSL ChangeCipherSpec Injection Vulnerability (CVE-2014-0224)

                                      Jun 06 2014
                                      Tags
                                      Cloud Best Practices
                                      Cloud Security
                                      Netskope Threat Research Labs
                                      Tools and Tips
                                      Vulnerability Advisory

                                      OpenSSL project published a security advisory yesterday (5th June 2014) providing information on a SSL/TLS Man-In-The-Middle vulnerability. By sending a special sequence of carefully crafted SSL packets to vulnerable client and server, an attacker posing as the Man-in-the-Middle can decrypt and eavesdrop/modify the traffic between the client and the server.

                                      SSL/TLS also called Secure Socket Layer protocol/Transport Layer Security protocol is used predominantly in the Internet to encrypt the traffic between a client and a server. For e.g. the traffic between your browser and your financial organization (such as banks etc.) is encrypted using the SSL/TLS protocols. The OpenSSL project provides an open source toolkit to implement the SSL/TLS protocol. This toolkit is very widely used on a number of servers and also clients that communicate with the servers on the internet.

                                      The following versions of OpenSSL are affected by this vulnerability:

                                      • OpenSSL 1.0.1 through 1.0.1g

                                      • OpenSSL 1.0.0 through 1.0.0l

                                      • all versions before OpenSSL 0.9.8y

                                      It is advised to upgrade to the following or any later versions:

                                      • OpenSSL 1.0.1h

                                      • OpenSSL 1.0.0m

                                      • OpenSSL 0.9.8za

                                      As part of the SSL/TLS protocol, during the setup of an encrypted communication channel between the client and the server, the client and server exchange information in a particular sequence.

                                      Some of the important items exchanged during the setup of the encrypted channel are:

                                      • Client and Server negotiated encryption algorithm

                                      • Client random number

                                      • Server random number

                                      Using the above, the client computes a pre-master key and sends it to the server. Both sides use the pre-master key to generate the master key which is then used to generate a session-key. Both sides then indicate that they will subsequently use the session-key for encrypting the communication by sending a “ChangeCipherSpec” message.

                                      In order to exploit this vulnerability, an attacker acting as the man-in-the-middle can send this “ChangeCipherSpec” message to both client and server prior to the client sending the pre-master key. This causes a vulnerable version of OpenSSL to assume that the pre-master is zero length and to go ahead with the generation of the master key and the subsequent session-keys. The attacker himself can also generate the same master key/session-keys and hence can decrypt/modify the communication between the client and the server.

                                      An important prerequisite to launch a successful exploit against this vulnerability is to have both a vulnerable OpenSSL Client and also a vulnerable OpenSSL Server.

                                      Typical man-in-the-middle attacks are difficult to achieve but given today’s adoption of public or rogue wifi hotspots/networks they are easy to execute. Given such scenarios it becomes important to protect ourselves against exploits taking advantage of this vulnerability.

                                      Modern web browsers do not typically use OpenSSL. Hence, consumers using browsers to access Cloud Apps are not impacted by this vulnerability. At the same time, if native applications such as an iOS apps or Android apps are being used, it is important to ascertain from the Cloud App vendor if vulnerable version of OpenSSL is used. If vulnerable version is used, consumers should upgrade to the patched version as and when the Cloud App vendor publishes an updated app.

                                      As a Cloud App vendor it is important to ensure that all the servers using vulnerable OpenSSL  are patched against this vulnerability.

                                      It is also important to assess as an enterprise if any appliances such as VPN, Proxies, etc. are using vulnerable versions of OpenSSL. Please contact the respective vendors for the applicable patches/upgrades. In case of any custom clients/servers created by your enterprise, please upgrade them with the latest OpenSSL toolkits.

                                      At Netskope, our cloud security research team is continuously monitoring the Cloud App vendor servers and will update this space with specific information.

                                      Bleiben Sie informiert!

                                      Abonnieren Sie den Netskope-Blog