Feeds

Your devices Heartbleeding - again

Access points, Android devices fall to Cupid's arrow

Intelligent flash storage arrays

Heartbleed is still offering rich pickings for security researchers, and presumably hackers, with Luis Grangeia of Sysvalue demonstrating attacks against wireless (and some wired) networking infrastructure using libraries linked to vulnerable OpenSSL versions.

The Lisbon-based researcher has demonstrated that this affects wireless infrastructure, some Android devices, Radius servers, and possibly reaching as far as iOS, OS X, and VoIP phones.

The basis of the “Cupid” attack tool demonstrated by Grangeia in this slideshow is that the popular EAP-PEAP, EAP-TTLS and EAP-TLS authentication protocols might (depending on the underlying implementation) use the vulnerable version of OpenSSL.

While some access points will have been patched, there's probably a bunch that haven't been, if only because even enterprise users might not have realised that they were vulnerable.

As Grangeia notes: “All these use a TLS tunnel over EAP to secure some part of the authentication process”.

His Cupid tool (proof-of-concept at github) has a patch for wpa_supplicant that implements a Heartbleed attack against access points, while hostapd-cupid attacks vulnerable terminals.

Freeradius is also vulnerable, Grangeia says, if it's linked to a vulnerable OpenSSL implementation.

Grangeia says the proof-of-concept demonstrates that two beliefs about OpenSSL and Heartbleed are mistaken: that Heartbleed was only exploitable over TCP, and that it can only be exploited after the TLS handshake. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.