Vulnerabilities in SSL & TLS :- Overview
24 Jan 2022, 10 a.m.
9 Feb 2022, 7:29 p.m.
02:28 minutes
Since January 6th, we have been looking at individual SSL/TLS vulnerabilities. This article will provide an overview of the series and provide background information on SSL/TLS for those who are unfamiliar with the subject. If you scroll to the bottom, you will find a handy reference sheet for when you are on the phone with customers.
Since January 6th, we have been looking at individual SSL/TLS vulnerabilities. This article will provide an overview of the series and provide background information on SSL/TLS for those who are unfamiliar with the subject.
A timeline of SSL and TLS development:
- SSL 2.0. Released in 1995, this version of SSL is now prohibited by the Internet Engineering Task Force (see RFC-6176).
- SSL 3.0. Released in 1996, SSL 3.0 is deprecated, but a few browsers still support it (RFC-7568).
- TLS 1.0. Released in 1999 and deprecated in 2020.
- TLS 1.1. Released in 2006 and deprecated in 2020.
- TLS 1.2. Released in 2008 and still has no security issues.
- TLS 1.3. Released in 2018 and continues to be the main protocol used today without any known vulnerabilities.
In this article series we will cover:
- Heartbleed
- SWEET32
- DROWN
- FREAK
- logjam
- BEAST
- BREACH
- RC4 Biases
- CCS injection vulnerability
- POODLE
- POODLE over TLS
- Lucky13
- TLS Renegotiation
Quick Guide
Right now, if you have the client on the phone, however…
Attack | CVE | Affects | Mitigation |
---|---|---|---|
Logjam | CVE-2015-4000 | The TLS protocol 1.2 and earlier when a DHE_EXPORT cipher suite is enabled. | Enforce DH group sizes of 1,024 bits and above |
POODLE | CVE-2014-3566 | SSL version 3.0 | Disable support for SSL 3.0 |
BEAST | CVE-2011-3389 | TLS 1.0 or any version of SSL | Enforce TLS 1.1 and higher |
CRIME | 2012-4929 | TLS compression | Disable TLS compression |
BREACH and TIME | CVE-2013-3587 | HTTP compression | Disable HTTP compression |
Lucky 13 | CVE-2013-0169 | TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2 in several vendors products | Disable CBC ciphers if your server implementation is flawed |
RC4 byte biases | CVE-2013-2566 | Connections supporting RC4 | Disable support for RC4 cipher suites |
FREAK | CVE-2015-0204 | Any system willing to negotiate RSA Export Keys. | Disable support for weak export-grade ciphers |
SWEET32 | CVE-2016–2183 and CVE-2016–6329 | Long term client browser foothold | Do not support or negotiate 3DES cipher-suites. At a minimum, AES should be preferred over 3DES. Limit length of TLS session. |
References
- BREACH - POC Release
- TLS Vulnerabilities SSLV 4.x Mitigation and Protection
- Drown Attack - Original Paper
- The Heartbleed Bug
- National Vulnerability Database - CVE-2014-0160
- TLS Security 6: Examples of TLS Vulnerabilities and Attacks
- Sweet32: Birthday attacks on 64-bit block ciphers in TLS and OpenVPN
- Weak Diffie-Hellman and the Logjam Attack
- POODLE attacks on SSLv3
- RC4 NOMORE - Numerous Occurrence MOnitoring & Recovery Exploit