Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Was SSL3 killed by a POODLE? Surveys says…Maybe!

When presented with a glass that is filled halfway, an optimist will say it is half full. The pessimist will say the glass is half empty. The engineer will say the glass is twice as big as it needs to be.

When presented with a glass that is filled halfway, an optimist will say it is half full. The pessimist will say the glass is half empty. The engineer will say the glass is twice as big as it needs to be.

Is it possible to apply this maxim to global SSL patch rates? Let’s take a look at the most recent SSL vulnerability: POODLE (CVE-2014-35660).

When POODLE was announced in September 2014, it marked the beginning of the end for the old SSL3 protocol. At the time, about 98% of HTTPS web servers supported SSL3. There had been speculation about weaknesses in the SSL3 protocol (which had been superseded by three versions of TLS: 1.0, 1.1, and 1.2), but nothing concrete enough to actively discourage its use.

POODLE changed the situation. Here was a specific, repeatable protocol vulnerability that could theoretically recover sensitive session data (web cookies) from a browser in seconds. Unlike Heartbleed, which affected specific implementations of SSL, POODLE was a protocol vulnerability, which meant that it affected all servers that supported SSL3. The good news was that the solution appeared simple and would require no code changes: just disable SSL3 in your server configuration file, right?

It’s been five months now. Can we stop saying SSL and just start saying TLS? Has the Internet been secured against POODLE?

The answer is, of course: kinda.

Data from Ivan Ristic’s SSL Pulse project show that approximately 50% of the Internet has disabled SSL3 in the months that have passed since POODLE. The optimists will think, “Wow, that’s about 10 million sites that have been modified, that’s impressive! Great job everyone.”

Statistics of SSL3 Support After POODLE Vulnerability

Figure 1: Source – SSL Pulse

Advertisement. Scroll to continue reading.

The pessimist will think: “Why wasn’t it 100%?  People didn’t even have to patch their code fer chrissakes, just turn a knob!” It would be nice if we could characterize the miscreants who aren’t part of the solution so that we could claim a moral security high ground. For example, it would be handy to say that, in general, sites still supporting SSL3 today are abandoned sites that no one cares about—but that’s not really true.

Even though sites can disable SSL3 very quickly, there are legions of SSL clients out there that cannot. They are stuck at SSL3 and may never get upgraded. It is for these legacy clients that many sites are still supporting SSL3. One site in particular is interesting: Google. Google reported and publicized POODLE, yet it still negotiates SSL3.

But even if there were no legitimate reasons to continue using SSL3, we would still see a lot of it out there. Here’s the thing. In the first year, patch rates for an arbitrary high-severity vulnerability fall off around 50%. It’s not just POODLE, it was the same for Heartbleed, and for HashDos before that. The decline from the initial 50% to zero is asymptotic. As an example, look at SSLv2, which has been absolutely, completely, irrevocably broken for over a decade, and yet there are still millions of websites that support it.

What does this mean looking forward?

If you haven’t gotten around to disabling SSL3 on your site yet, honestly, it’s not a huge rush. An exploit was never seen in the wild for POODLE. And all the modern browsers are disabling SSL3, which should protect the users. Even though there’s been the initial dropoff from 98% to 50%, we’re going to see SSL3 server support around the Internet for years to come.

So, if you were hoping that we could finally stop saying “SSL” and move on to the “new” acronym, TLS, the answer for that is no. Just ask Ivan Ristic, whose recent book title had to include both: “Bulletproof SSL and TLS.” There is a good chance we’ll always be talking about SSL, no matter when SSLv2 and SSLv3 finally go extinct.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.