Critical and Time Sensitive OpenSSL Vulnerability – The Race Between Attackers and Defenders

Teilen:

Update: On November 1st the OpenSSL project maintainers released their fix for the vulnerabilities. There were two vulnerabilities discovered. After engagement with experts from the industry, it was decided to reduce the severity classification to HIGH instead. The reason for the severity update lies behind the probability of gaining remote code execution in modern operating systems. However, the OpenSSL project is integrated into many operating systems including some with less advanced security mitigations that may allow attackers to gain remote code execution. Hence, in spite of the severity degradation, it’s still very important to update the OpenSSL library to the latest version. 

OpenSSL has angekündigt a critical fix in version 3.0.7 to be released Nov 1, 2022. It means that on Tuesday Nov 1 the race will start between those who patch and those who exploit. In this blog post, we’ll summarize all the necessary information required to make sure you can win this race and keep your software supply chain risk-free.

 

OpenSSL – The Popular TLS Implementation Library

OpenSSL is an open-source implementation of the SSL and TLS protocols, built for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end. It is widely used by internet servers, HTTPS websites, and a vast number of services that need cryptographic functionality – operating systems (e.g., Windows, Linux. macOS), client-side software, web and email server software (e.g., Apache, Nginx), network appliances (e.g., Cisco, Juniper), industrial control systems, etc.

The immanent dependency of software security on OpenSSL became most evident in 2014 when the critical Heartbleed bug (CVE-2014-0160) was published and wreaked havoc among the entire internet industry, as attackers could covertly eavesdrop on internet communications, steal data from services and users, or impersonate services. Half a million widely trusted websites were found vulnerable.

Critical Security Fix Pre-Announcement 

No details have been shared with the public about the vulnerability yet. The OpenSSL project decided to give the heads-up about the upcoming patch – 5 days in advance – to give organizations enough time to inventory their software and be prepared to fix all instances as soon as the patch is released. The release will be available on Tuesday, 1st November 2022, between 1300-1700 UTC. Once released, malicious actors will quickly learn how to exploit the weakness, and users will have to act ASAP to upgrade their systems, especially if the exploit won’t require significant effort. OpenSSL defines a critical flaw as one that enables significant disclosure of the contents of server memory and potential user details, vulnerabilities that can be exploited easily and remotely to compromise server private keys.

SBOM To The Rescue

Until a patch is released, all you need to do is scan and detect usages of the vulnerable library anywhere in your tech stack and prepare to upgrade. The vulnerability exists in version 3.0 and above. So if you found a product using an older version, that product is not affected.

But wait, is your organization in a position to discover usage of vulnerable libraries quickly and efficiently? Unfortunately, as we learned with recent Log4J vulnerabilities, for the majority of organizations that answer is “no”. Thus the importance of a Software Bill of Material or SBOM. You can read an introduction to SBOMs here and better understand its role in broader software supply chain security solutions.

Anything that communicates with the Internet securely could potentially have OpenSSL built into it. It’s recommended to create a patch plan for two types of software:

#1 – Your Production Pipeline

Inventory all software artifacts that go to production and contain OpenSSL v3.0+. This can be achieved by generating an SBOM for each artifact, scanning the output and looking for the vulnerable library. Once you complete the scan, you’ll have the full list of all artifacts that require patching when the fix is released.

Note: there may also be scenarios where OpenSSL isn’t used inside your artifact, but it exists on the machine on which your software is running, such as an EC2 server running Nginx. In these cases, to be on the safe side, we recommend connecting to the server and running a filesystem search to look for the openssl library. If found, check if its version is 3.0 or above.

#2 – 3rd Party Vendors

Inspect all technologies and services you use in your different environments. It’s important to monitor software products vendors’ advisories, and follow their guidelines to keep your environments safe. Once the OpenSSL releases the patch, vendors are likely to update their customers whether they’re vulnerable and their planned fix timeline.

Legit Security Is Here To Help

Software supply chain attacks have been on the rise and attackers keep looking for weaknesses in CI/CD pipelines to wreak havoc over organizations. The OpenSSL vulnerability could turn out to be similar to the Log4J vulnerability from last year, and it’s important to keep guards in place.

Legit Security is ready to help with guidance and visibility through our SBOM capabilities so that you can navigate this upcoming storm successfully. Contact us at Legit Security. We’ll help anyone – free of charge and with no commitments.

https://www.legitsecurity.com/blog/a-critical-openssl-vulnerability-the-race-between-attackers-and-defenders?utm_source=cyfluencer&utm_medium=influencer_library

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
1:10 am, Juli 2, 2025
Wetter-Symbol 21°C
L: 20° | H: 22°
aufgelockerte Bewölkung
Luftfeuchtigkeit: 75 %
Druck: 1015 mb
Wind: 7 mph NNE
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 33%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:48 am
Sonnenuntergang: 9:20 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
20° | 22°°C 0.38 mm 38% 11 mph 79 % 1022 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
14° | 26°°C 0 mm 0% 13 mph 55 % 1028 mb 0 mm/h
Fr. Juli 04 10:00 pm
Wetter-Symbol
15° | 26°°C 0 mm 0% 12 mph 57 % 1028 mb 0 mm/h
Sa. Juli 05 10:00 pm
Wetter-Symbol
15° | 25°°C 1 mm 100% 15 mph 89 % 1022 mb 0 mm/h
So. Juli 06 10:00 pm
Wetter-Symbol
14° | 19°°C 1 mm 100% 13 mph 81 % 1012 mb 0 mm/h
Today 4:00 am
Wetter-Symbol
18° | 20°°C 0 mm 0% 6 mph 76 % 1015 mb 0 mm/h
Today 7:00 am
Wetter-Symbol
18° | 19°°C 0.2 mm 20% 5 mph 79 % 1016 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
21° | 21°°C 0.2 mm 20% 6 mph 71 % 1017 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
19° | 19°°C 0.38 mm 38% 4 mph 69 % 1018 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
23° | 23°°C 0.35 mm 35% 6 mph 41 % 1019 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
23° | 23°°C 0.01 mm 1% 11 mph 28 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
18° | 18°°C 0 mm 0% 10 mph 34 % 1022 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 7 mph 37 % 1025 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€89,522.80
-1.36%
Ethereum(ETH)
€2,037.93
-3.27%
Fesseln(USDT)
€0.85
-0.01%
XRP(XRP)
€1.84
-2.89%
Solana(SOL)
€124.41
-5.21%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.133618
-4.51%
Shiba Inu(SHIB)
€0.000009
-2.12%
Pepe(PEPE)
€0.000008
-5.16%
Nach oben scrollen