Cyber Security News & Current Events

Complete Heartbleed Protection in Under 36 Hours From Discovery

Posted by Sash on 14/04/2014 4:20:00 PM

Much has been written about the OpenSSL Heartbleed vulnerability, which affects the TLS heartbeat mechanism used by some versions of the OpenSSL library. Numerous open source and commercial products use affected versions of OpenSSL for their implementation of PKI, including enterprise hardware and software products.

The details and inner workings of the vulnerability are not the subject of this article - rather the effectiveness and real-world implementation of protection mechanisms against this and other similar vulnerabilities which may not have experienced the same widespread publicity.

A Bleeding Good Time

The reality of the situation is whilst this vulnerability has been present for a number of years, apart from potential awareness by intelligence agencies, the threat became real once the vulnerability was published. The systems that have been affected range from webservers to hardware security appliances, and many products in-between.

The first task is to analyse an organisation’s hardware and software inventory to determine affected systems, components and products. As patches are created, tested and published by vendors, then tested and deployed by customers, there exists a significantly-wide window where an organisation is susceptible to compromise.

Most large vendors required at least several days before they made patches available, followed by delays in testing and deployment by the end-user. Adding to this is most patches are released from the US, meaning an overnight delay for many patches before Australian IT departments are able to commence their response.

We observed a massive quantity of OpenSSL Heartbleed attacks on our Australian-based clientele’s assets starting from 3-4 days following the publishing of the vulnerability. It is unrealistic if not impossible, depending on the products used in each environment, to be able to be completely patched within the timeframe from publishing to widespread exploitation.

Clients using Security Centric network perimeter security solutions, including managed UTM solutions were completely protected from OpenSSL Heartbleed less than 36 hours after the vulnerability was published, and well before widespread exploitation began. The protection did not require any end-user actions or testing, and prevented all services including webservers, VPNs, and custom applications from compromise and information disclosure.

The Heartbleed vulnerability is not particularly unique in its attack mechanism, and reinforces the need for defence in depth. Adequate and properly-configured perimeter security; content inspection and intrusion prevention at gateways/aggregations points; ongoing vulnerability management across all types of assets, not just Microsoft operating systems and applications; and across-the-board activity and event monitoring, logging and auditing.

Finally, an actionable blog

The purpose of this blog is to make available the real-world lessons, experience, observations and mistakes that are part of the daily life of a group of cyber security professionals.

Read about:

  • What mistakes organisations are making (anonymously of course!)
  • What effective actions are available to quickly and economically achieve effective protection (without buying new kit)
  • Trends we're seeing, via our incident response and forensic investigation capabilities
  • And sometimes, just frustrations about what is wrong with cyber :|

Subscribe:

Recent Posts