If you have any questions, please contact SecurityMetrics support, 801.705.5700.
If you have any questions, please contact SecurityMetrics support, 801.705.5700.
Follow up investigations on the FREAK vulnerability have led to the discovery of yet another SSL encryption protocol vulnerability: Logjam. According to researchers at Johns Hopkins University, the flaw has been around for almost two decades, but was just recently discovered. It weakens the encrypted connection between user and web/email server. About 8% of the top one million HTTPS sites are estimated to be vulnerable.
The problem is, the encryption protocol called Diffie-Hellman lets hackers downgrade connections to crackable 512-bit security (if an attacker can get man-in-the-middle access). It’s unknown if malicious entities have exploited the weakness.
See also: PCI DSS 3.1: Stop Using SSL and Outdated TLS Immediately
Luckily, we aren’t waiting around for browser patches for this vulnerability. It’s already been patched. Here are our recommendations.
SecurityMetrics vulnerability scan customers can check if their systems are vulnerable by running a SecurityMetrics vulnerability scan. If you've been running your regular scans and fixing vulnerabilities as they arise, you should already be covered on a server level basis.
If you have any questions, please contact SecurityMetrics support, 801.705.5700.