Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

CrowdStrike Releases Heartbleed Scanner

After details of the critical “Heartbleed” vulnerability in OpenSSL emerged earlier this month, there has been widespread concern among system administrators, network security teams, software developers and essentially anyone with any technical connection to the Internet.

After details of the critical “Heartbleed” vulnerability in OpenSSL emerged earlier this month, there has been widespread concern among system administrators, network security teams, software developers and essentially anyone with any technical connection to the Internet.

Heartbleed Scanner

In short, the Heartbleed vulnerability allows attackers to repeatedly access 64K blocks of memory by sending a specially crafted packet to a server running a vulnerable version of OpenSSL. 

In response to significant concern, CrowdStrike has released a free tool aimed at helping organizations detect the presence of systems (such as web servers, VPNs, secure FTP servers, databases, routers, phones etc.) on their networks that are vulnerable to the OpenSSL Heartbleed vulnerability.

“We realized that there was a largely unmet demand for an easy to use UI tool capable of also scanning the internal networks and non-HTTPS services for this vulnerability since this problem is so much bigger than just external websites,” Dmitri Alperovitch, Co-Founder & CTO of CrowdStrike wrote in a blog post

Developed by CrowdStrike’s Robin Keir, and released as a free tool available to anyone, CrowdStrike Heartbleed Scanner shows a list of vulnerable servers and outputs the contents of the 64kb of memory that a vulnerable server returns back to the heartbeat SSL request.

The scanner runs on both 32-bit and 64-bit versions of Windows XP or later and can be downloaded here

Related: Heartbleed Flaw Used to Bypass Two-factor Authentication, Hijack User Sessions: Mandiant

Advertisement. Scroll to continue reading.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.