Windows vulnerable to Freak attacks, says Microsoft

Microsoft has revealed that all supported versions of its Windows operating system are vulnerable to attacks exploiting the so-called Freak security vulnerability.

The vulnerability, introduced by old US export policies requiring weaker encryption, enables attackers to conduct man-in-the-middle attacks on connections between vulnerable devices and websites.

Researchers discovered that the decade-old vulnerability can be exploited to conduct man-in-the-middle attacks on secure sockets layer (SSL) andtransport layer security (TLS) connections.

They found that once intercepted, the connnections can be forced to use ‘export-grade’ cryptography, even if the weak algorithms are disabled by default.

Initially, only browsers in Android and iOS devices appeared to be vulnerable, but Microsoft said in a security advisory that it is aware of a security feature bypass vulnerability in its Secure Channel (Schannel) security component that implements the SSL and TLS protocols.

“The vulnerability facilitates exploitation of the publicly disclosed Freak technique, which is an industry-wide issue that is not specific to Windows operating systems,” the security advisory said.

However, Microsoft said Windows servers are not affected if the RSA export cipher at the heart of the Freak vulnerability is disabled.

Microsoft has given no indication whether a patch will be released as part of the next monthly scheduled security update or as a separate patch, but said users of Windows Vista and later versions could protect themselves bydisabling RSA key exchange ciphers using the Group Policy Object Editor.

Although Microsoft Research was part of the team that uncovered the Freak vulnerability alongside European cryptographers, the software maker has been slow to disclose the vulnerability in Windows.

“The older your infrastructure, the more likely latent vulnerabilities will surface – as they have in this case,” said Simon Crosby, CTO and co-founder of endpoint security firm Bromium.

“Attackers will exploit any opportunity – and the legacy base is full of holes, so CIOs need to continually upgrade and patch where they can,” he added.

About one-third of encrypted websites, or 12% of all websites, are believed to be vulnerable, including several banks, media sites and government agencies.

Google has already released a fix and Apple is expected to release one soon. Independent security consultant Graham Cluley has advised website owners to disable support for any export suites on their web servers.

“Freakattack.com suggests that instead of simply excluding RSA export cipher suites, administrators should disable support for all known insecure ciphers and enable forward secrecy,” Cluley said in a blog post.

The vulnerability is the latest in a series of weaknesses discovered in SSL/TLS, the technology that was designed to keep online transactions secure.

Apple patched a critical SSL flaw in iOS and Mac OS about a year ago, but that has since been followed by other SSL flaws better known asHeartbleed, Poodle, Superfish and PrivDog.

Although the Freak vulnerability has existed for more than a decade, researchers said there is no evidence that any attackers have exploited the weakness to date.

Although security experts are advising organisations to patch their web servers and use only strong encryption algorithms, many have pointed out that the Freak vulnerability is not easy to exploit

“It will require several conditions to be met, so it is not as severe as Heartbleed, which could be readily exploited,” said TK Keanini, chief technology officer at security firm Lancope.

While it is not trivial to exploit, Keanini said the most advanced threat actors do have the capabilities to exploit this vulnerability, and all clients and servers should be configured not to allow weaker encryption.

Other commentators have gone so far as to suggest that the Freak vulnerability is little more than a hypothetical threat based on unusual conditions not likely to affect many users of the internet.

“An attack would require a sophisticated attacker with a set of tools and technology not in common use,” said Phil Lieberman, chief executive of Lieberman Software.

“The attack is very difficult to set up and is in the realm of state-sponsored physical intrusion of your internet connection or your Wi-Fi connection.”

Lieberman said that although the attack mechanism described is a valid methodology, it depends on the physical compromise of a connection and a series of coincidences, such as the target using a vulnerable browser to access a vulnerable website.

“Freak is a low-probability threat, so little needs to be done beyond upgrading to the latest versions of web server software and blocking weak encryption in browsers,” he added.

Source: computerweekly.com

Koristimo kolačiće kako bi poboljšali Vaše korisničko iskustvo i funkcionalnost stranice. Više informacija o kolačićima možete pronaći ovdje.

Ključni su za upotrebu Internet stranice i bez istih stranica nema svoju punu funkcionalnost. Nastavkom surfanja i kupovinom neophodni se kolačići smatraju prihvaćenima. Funkcionalni kolačići mogu uključivati kolačiće koji pružaju uslugu koju je korisnik zatražio.

cookies_permission

Za pohranu prihvaćanja kolačića.

Ističe: 1 godina

Vrsta: HTTP

Prikupljaju se anonimno, ne mogu pratiti aktivnosti korisnika na drugim Internet stranicama i služe za praćenje ponašanja korisnika te u svrhu mjerenja ponašanja publike i sastavljanja izvješća za poboljšanja Internet stranice. Ovi kolačići omogućuju prijenos podataka u treće zemlje, uključujući SAD.

cookies_permission_analiza

Za pohranu prihvaćanja analitičkih kolačića.

Ističe: 1 godina

Vrsta: HTTP

sbjs_current

Za pohranu detalja preglednika.

Ističe: Sesija

Vrsta: HTTP

sbjs_current_add

Dodatni metapodaci o izvoru prometa trenutne sesije korisnika.

Ističe: Sesija

Vrsta: HTTP

sbjs_first

Bilježi izvor prometa prvog posjeta korisnika web stranici (npr. izvorni UTM parametri).

Ističe: 6 mjeseci

Vrsta: HTTP

sbjs_first_add

Pohranjuje dodatne pojedinosti o izvoru prometa za prvi posjet korisnika.

Ističe: 6 mjeseci

Vrsta: HTTP

sbjs_migrations

Prati prijelaze između izvora prometa, primjerice kada korisnik mijenja kampanje ili preporuke.

Ističe: 6 mjeseci

Vrsta: HTTP

sbjs_session

Prati podatke o prometu specifične za sesiju, kao što je izvor preporuke za trenutni posjet.

Ističe: Sesija

Vrsta: HTTP

sbjs_udata

Pohranjuje skupne korisničke podatke, kao što je kombinacija izvora prometa kroz posjete.

Ističe: 6 mjeseci

Vrsta: HTTP

Kolačići su male tekstne datoteke koje internetske stranice koriste kako bi unaprijedile korisničko iskustvo.

Zakon dopušta spremanje kolačića na vaš uređaj ako je to izričito potrebno za rad stranice. Za sve ostale vrste kolačića trebamo vašu suglasnost.

Ove stranice koriste različite vrste kolačića. Neke kolačiće postavljaju usluge trećih strana koje se prikazuju na našim stranicama.

Vašu suglasnost za Izjavu o kolačićima na našim internetskim stranicama možete u bilo kojem trenutku promijeniti ili povući.

Više informacija o tome tko smo mi, kako nas možete kontaktirati i kako obrađujemo vaše osobne podatke možete pronaći u našoj Politici privatnosti.

Molimo vas da pri kontaktiranju vezano za vašu suglasnost navedete svoj ID broj suglasnosti i datum isteka iste.