Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Comodo Finds Misissued Certificates

Comodo admitted on Monday that it had mistakenly issued a total of eight digital certificates that did not comply with baseline requirements.

Comodo admitted on Monday that it had mistakenly issued a total of eight digital certificates that did not comply with baseline requirements.

In 2011, the CA/Browser Forum adopted version 1.0 of the baseline requirements (BR) for the issuance and management of publicly-trusted certificates. One of the sections in the BR, which went into effect in July 2012, says certificate authorities (CAs) should not issue certificates with an expiry date later than November 1, 2015 with a Subject Alternative Name or Subject Common Name field containing an internal server name or IP address.

The CA/Browser Forum explained that certificates with names such as “mail” or IP addresses like 192.168.0.1, which are often used internally, can pose a serious security risk. For example, in the case of a certificate with the name “mail,” an attacker could bring such a certificate into the corporate network and use it in combination with local name spoofing to impersonate the targeted organization’s mail server and steal users’ credentials and other sensitive information.

Comodo issued a total of eight such certificates with an expiry date later than November 1. Of these eight certificates, the most risky appear to be ones with the Common Name “help” and “mailarchive.”

Rob Stradling, senior research and development scientist at Comodo, explained that the error occurred due to a code change implemented on October 30. The change was meant to automatically delete all internal names and IP addresses from a certificate request before the certificate was issued, but the change had not worked as intended due to an oversight by the developer.

The forbidden certificates were identified on November 5 and a hotfix was deployed within a couple of hours after the bug was found. All of the misissued certificates were added to the Certificate Transparency framework, whose goal is to allow domain owners to monitor the use of certificates issued for them and prevent abuse.

Stradling says Comodo has identified similar non-compliant certificates issued by other CAs as well, but details will be provided at a later time.

Recent incidents have led to major Internet companies becoming increasingly concerned about digital certificate security. The list of CAs that issued unauthorized certificates recently includes the China Internet Network Information Center (CNNIC), and Symantec, which recently admitted inappropriately issuing thousands of certificates.

Advertisement. Scroll to continue reading.

Opera Software recently proposed the implementation of a requirement to get CAs to publicly disclose all incidents involving misissued certificates. The goal would be to help CAs learn from each other’s mistakes, increase transparency, and better allow users and vendors to determine how trustworthy an issuer is.

Related Reading: Mozilla Could Start Rejecting SHA1 Certificates Sooner Than Planned

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Compliance

Web scraping is a sensitive issue. Should a third party be allowed to visit a website and use automated tools to gather and store...

Cloud Security

Proofpoint removes a formidable competitor from the crowded email security market and adds technology to address risk from misdirected emails.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...