Categories: Security

Don’t Let Your Business Sink from Latest DROWN Vulnerability

Many of you may have heard about the DROWN attack on SSL/TLS encryption in the media over the last week or so, not to mention previous issues such as the Heartbleed Bug.  I wanted to take a moment though to talk about the former and its impact on businesses worldwide.

“DROWN” stands for “Decrypting RSA with Obsolete and Weakened eNcryption.” For those of you of a technical inclination, you can read the technical paper or for a less technical discussion, simply visit the DROWN website.  The long and short of it is that given the proper situation, it is possible to attack the encryption of the relatively secure TLS protocol, through SSLv2, in a way that it would be possible to decrypt the contents of encrypted network traffic at a relatively low cost.  The core issue is that although TLS is reasonably secure, SSL is not and servers that run both can lead to a compromise of the more secure protocol.

The attack requires two essential elements:

  1. The ability to intercept (or “Man in the Middle” attack) a client’s connection. This typically means getting access to the local network of the client or one of the networks that the client’s traffic passes through.  While this may seem like a significant barrier, it is often easier than you think, particularly with access to the local network and tools such as Responder.py.
  1. Servers that support both TLS and SSL encryption. Although it is often the case that this means web servers, it is not always so, and can often include services such email (IMAPS, POP3S, SMTPS) or file transfer (FTPS).  In fact, SSL has been deprecated for some time and the IETF has explicitly said not to use it.  Similarly, for those subject to PCI (credit card data handling), removing SSL will soon be required for compliance.  As an IT professional, I would be especially concerned about services that have any type of authentication.

In addition to these two main issues, there are a few other requirements that I believe need to be in place for this attack to succeed:

  1. Fast computation. The attack relies on the ability to perform a cryptographic attack within the default TLS timeout, which is stated to be one minute.  This can easily be done with modern cracking hardware, and the paper authors were able to do this using cloud servers well within the timeout period and for a very reasonable price.
  1. A decent network connection. In order for the attack to work, it is necessary to make a number of connections to the TLS server in order to perform the attack.  The authors were able to do this quite handily, but it appears that they were doing this at Ethernet speed.  Ironically, a very bad web server on a slow connection might increase security in this regards.

In order to minimize this risk, I strongly suggest that you assess (at the least) your Internet facing servers for this vulnerability.  There are a few ways to do this:

  1. Use the lookup tool on the DROWN attack website to determine if your Internet facing servers have the vulnerability. There is also a client-side scanning tool hosted on GitHub.
  1. Perform a vulnerability assessment or penetration test. If you use a modern scanning tool such as Tenable’s Nessus, you can quickly and easily do this yourself right now at minimal cost.  There are also any number of service providers (including CDW) that can do this for you.  I strongly suggest you scan all of your devices on all ports, as SSL can live on many areas you might not expect, including database servers, embedded devices and network appliances that may not be part of your normal patch cycle.  Start with external servers, to be sure, but don’t neglect the internal systems either as getting internal access is probably not as hard as you think!
  1. Use a passive monitoring device to identify vulnerable servers. Many intrusion prevention devices can detect this risk.  CDW offers a zero-cost assessment service known as the “CDW Threat Check” that can also detect this risk.
  1. Manually patch your servers. Consult your vendor’s resources for the most effective approach.

For the latest on security threats, check out BizTech Magazine or CDW’s Media Library to protect your business from cyber attacks.

Share
CDW Expert

From implementing IT solutions to researching emerging tech trends, our experts have years of experience working with the latest technologies.

Comments are closed.

Recent Posts

  • Cloud
  • Digital Workspace

The Benefits of Managed Private VMware Cloud

We recently worked with two very different companies seeking to solve very different problems. The first was a financial services…

4 months ago
  • Digital Workspace
  • Services

Intel and ServiceNow: A Powerful Combination for Remote Devices

For the first time, Intel is integrating its remote management features with the ServiceNow IT service management platform. For our…

4 months ago
  • Cloud
  • Security
  • Services

Building a Zero-Trust Environment with Microsoft 365

Today’s threat environment requires new ways of thinking about cybersecurity controls. Gone are the days when organizations could rely on…

4 months ago
  • Cloud
  • Security

3 Ways to Better Integrate Physical Security with IT Systems

Physical security systems are undergoing a disruptive digital transformation. Long managed by physical facilities teams, these systems are now moving…

4 months ago
  • Security
  • Services

How Managed Detection and Response Closes Cybersecurity Gaps

After every new cybersecurity incident, I hear from organizations wanting to learn more about managed detection and response. MDR typically…

4 months ago
  • Digital Workspace
  • Networking

How Virtual Rounding Remains a Valuable Post-COVID Alternative

Before the pandemic, if I had approached a healthcare clinician and said, “Three months from now, you’re going to sit…

4 months ago