Evento di Lancio: Smart AI Security. Controllo Totale dei Dati. Prenota il tuo posto

chiudere
chiudere
La tua rete di domani
La tua rete di domani
Pianifica il tuo percorso verso una rete più veloce, sicura e resiliente, progettata per le applicazioni e gli utenti che supporti.
          Experience Netskope
          Prova direttamente la piattaforma Netskope
          Ecco la tua occasione per sperimentare in prima persona la piattaforma single-cloud di Netskope One. Iscriviti a laboratori pratici e a ritmo autonomo, unisciti a noi per dimostrazioni mensili di prodotti dal vivo, fai un test drive gratuito di Netskope Private Access o partecipa a workshop dal vivo guidati da istruttori.
            Un leader in SSE. Ora è un leader nel settore SASE a singolo fornitore.
            Netskope è riconosciuto come Leader Più Lontano in Visione sia per le piattaforme SSE che SASE
            2 volte leader nel Quadrante Magico di Gartner® per piattaforme SASE
            Una piattaforma unificata costruita per il tuo percorso
              Securing Generative AI for Dummies
              Securing Generative AI for Dummies
              Scopri come la tua organizzazione può bilanciare il potenziale innovativo dell'AI generativa con pratiche solide di sicurezza dei dati.
                eBook sulla Modern Data Loss Prevention (DLP) for Dummies
                Modern Data Loss Prevention (DLP) for Dummies
                Ricevi consigli e trucchi per passare a un DLP fornito dal cloud.
                  Modern SD-WAN for SASE Dummies Book
                  Modern SD-WAN for SASE Dummies
                  Smettila di inseguire la tua architettura di rete
                    Comprendere dove risiede il rischio
                    Advanced Analytics trasforma il modo in cui i team di operazioni di sicurezza applicano insight basati sui dati per implementare policy migliori. Con l'Advanced Analytics, puoi identificare tendenze, concentrarti sulle aree di interesse e utilizzare i dati per agire.
                        Supporto tecnico Netskope
                        Supporto tecnico Netskope
                        I nostri ingegneri di supporto qualificati sono dislocati in tutto il mondo e possiedono competenze diversificate in sicurezza cloud, networking, virtualizzazione, content delivery e sviluppo software, garantendo un'assistenza tecnica tempestiva e di qualità.
                          Video Netskope
                          Formazione Netskope
                          La formazione Netskope ti aiuterà a diventare un esperto di sicurezza cloud. Siamo qui per aiutarti a proteggere il tuo percorso di trasformazione digitale e a sfruttare al meglio le tue applicazioni cloud, web e private.

                            DROWN Vulnerability Remains High

                            Mar 08 2016
                            Tags
                            Cloud Best Practices
                            Cloud Security
                            Netskope Threat Research Labs
                            Tools and Tips
                            Vulnerability Advisory

                            On March 1st, 2016 researchers disclosed a critical vulnerability affecting SSL and TLS protocol, most widely used secure protocols over the internet. The attack, termed DROWN (an acronym for Decrypting RSA with Obsolete and Weakened eNcryption) is a cross protocol attack that affects any server that supports SSLv2 connections and also any other servers (including SMTP, IMAP, etc.) that shares the same certificate with an SSLv2 supported server.

                            In order to launch a DROWN attack, first the attacker passively intercepts the traffic between the client and the server and records any version of TLS RSA messages. As per researchers, later using this attack, the attacker can decrypt one out of 1000 intercepted connections. From the encrypted TLS messages, ciphertext containing the 48-byte premaster secret is then converted to valid RSA PKCS #1 v1.5 encoded ciphertexts with length acceptable to SSLv2 oracle. A version of the Bleichenbacher attack is then used to query the oracle with valid SSLv2 RSA ciphertext which leaks information about the master secret key. This information can then be used to compute the session key allowing the attacker to decrypt the earlier recorded TLS messages. The decrypted messages can disclose sensitive information such as login credentials, cookies, company confidential data, etc.

                            DROWN has been assigned CVE-2016-0800 with a severity rating of High. According to the data published by researchers, TLS 1.2 handshake using 2048 bit RSA can be decrypted in under 8 hrs at a cost of only $440. The attack time can be further reduced to one minute using the recently discovered vulnerability in OpenSSL (CVE-2016-0703) making it possible to perform MiTM attacks within a very short time window. The same data published by researchers also mentions that 33% of all servers on the internet could be vulnerable to this attack.

                            At Netskope, we have been monitoring SaaS apps to check if they are vulnerable to DROWN. As part of our research, we have identified 676 SaaS apps that are vulnerable to the attack.The breakdown of SaaS apps vulnerable to DROWN per the Netskope Cloud Confidence Index (CCI) is as follows:

                            • 2 Apps have a “High” CCI rating;
                            • 42 Apps have a “Medium” CCI rating
                            • The remainder have either a “Low” or “Poor” CCI rating.

                            We also identified the following interesting observations related to the 676 SaaS applications vulnerable to the DROWN attack:

                            • 73 apps are still vulnerable to FREAK attack
                            • 42 apps are still vulnerable to Logjam attack
                            • 38 apps are still vulnerable to OpenSSL CCS attack
                            • 7 apps are still vulnerable to Poodle

                            The above indicates poor patch management practices by some of the these vulnerable app vendors.

                            If you are a SaaS app vendor, we suggest the following to identify and mitigate the potential effects of the DROWN attack:

                            • Check if your server is vulnerable to the attack using the DROWN attack checker.
                            • Mitigate the vulnerability by disabling the support for SSLv2 immediately. Please note that disabling SSLv2 ciphers on servers vulnerable to CVE-2015-3197 will NOT be sufficient as clients can force the use of SSLv2 with EXPORT Ciphers.
                            • OpenSSL has released patch for CVE-2016-0703 and CVE-2015-3917. Apply the patched versions 1.0.2g and 1.0.1s for 1.0.2 and 1.0.1 respectively.
                            • Microsoft IIS users should upgrade to versions 7.0 and above which has SSLv2 disabled by default
                            • Check the detailed instructions here to get more information on vulnerable platforms and products along with the steps for mitigation.

                            Acknowledgements

                            I would like to thank Nitish Balachandran and Arun Prabhu Dhandapani for their assistance on the research, analysis, and reporting.

                            Connettiti con Netskope

                            Iscriviti al blog di Netskope

                            Iscriviti per ricevere ogni mese una panoramica degli ultimi contenuti di Netskope direttamente nella tua casella di posta.