NOTICE: Significant community changes coming soon
The header menu and the home page on our community will be changing soon. Get more information HERE.

The New BEAST – Poodle

Absent Member.
Absent Member.
0 0 8,089
0 Likes

On October 14th a new CVE was added to the ever-growing list of critical Transport Layer Security (TLS) vulnerabilities discovered in 2014. Dubbed “Poodle” (Padding Oracle On Downgraded Legacy Encryption), CVE-2014-3566 explains a new protocol-downgrade issue targeting SSLv3. An active attacker could use this vulnerability to obtain part of the encrypted SSL communication, such as secure cookies that may contain authentication tokens and other critical data, in plain text.

 

A downgrade attack is a common phenomenon leveraging man-in-the-middle (MitM) conditions. An attacker with an ability to alter secure network traffic can trick both parties into downgrading to earlier versions of an SSL protocol supported by both of them (e.g. TLSv1 instead of TLS1.1 or SSLv3 instead of TLSv1). The attacker may then leverage other protocol weaknesses such as a weak cipher suite or key strength to gain access to secure communication. Previously well-known downgrade attacks include version rollback attacks. SSLv3 contains a provision to prevent unnecessary downgrade to SSLv2. However, TLS versions are missing any such provision.

 

This vulnerability leverages protocol downgrade to SSLv3 and then padding attacks on CBC mode ciphers. Since the alternate to CBC mode ciphers is RC4, which is already known to be weak, disabling SSLv3 is the recommended mitigation technique to achieve desired level of security through encrypted connection [4]. Even though the TLS_FALLBACK_SCSV mechanism has also been recommended to prevent downgrade attacks, effectiveness of this mechanism is dependent on both client and server implementing it. As of this posting only a few browsers support it, so it may not effectively prevent Poodle attacks in all cases.

 

Security Research has added a check to detect SSLv3 support on the target server along with CBC mode cipher list via Web Inspect. Details of how to leverage this feature can be found on the Security blog.

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.