CERT Australia OpenSSL heartbeat vulnerability Heartbleed Abstract Researchers from Google security and Codenomicon have recently discovered a vulnerability in OpenSSL’s Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols. Details of this vulnerability were publicly released on 8 April 2014 and numerous proof of concept code samples for exploiting the vulnerability followed. An attacker could exploit this vulnerability to compromise the confidentiality of the affected system by obtaining a variety of information including but not limited to primary keys and usernames and credentials. This publication is provided for situational awareness and to allow consideration of proper mitigations including updating the software. This document remains the property of the Australian Government. The information contained in this document is for the use of the intended recipient only and may contain confidential or privileged information. If this document has been received in error, that error does not constitute a waiver of any confidentiality, privilege or copyright in respect of this document or the information it contains. This document and the information contained herein cannot be disclosed, disseminated or reproduced in any manner whatsoever without prior written permission from the Assistant Secretary, CERT Australia, Attorney-General's Department, 3 - 5 National Circuit, Barton ACT 2600. The material and information in this document is general information only and is not intended to be advice. The material and information is not adapted to any particular person’s circumstances and therefore cannot be relied upon to be of assistance in any particular case. You should base any action you take exclusively on your own methodologies, assessments and judgement, after seeking specific advice from such relevant experts and advisers as you consider necessary or desirable. To the extent permitted by law, the Australian Government has no liability to you in respect of damage that you might suffer that is directly or indirectly related to this document, no matter how arising (including as a result of negligence). Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It is widely deployed and utilised. Details Researchers from Google security and Codenomicon have recently discovered a vulnerability in OpenSSL’s Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols. Details of this vulnerability were publicly released on 8 April 2014 and numerous proof of concept code samples for exploiting the vulnerability followed. The range of services which may be impacted by proof of concept code is also increasing. The vulnerability lies in the implementation of the Heartbeat extension (RFC6520)[1] known as ‘Heartbleed’. By sending specially crafted heartbeat requests a malicious actor can obtain up to 64KB segments stored in memory on the affected device. While each request is limited to 64KB it is possible to use repeated requests to retrieve more 64KB segments. The versions of OpenSSL affected are 1.0.1 up to 1.0.1f and 1.0.2-beta1 and the vulnerability has been assigned CVE-2014-0160[2]. OpenSSL have released version 1.0.1g which addresses this vulnerability. Proof of concept code exists which can exploit this vulnerability from a malicious client. Proof of concept code also exists where a malicious server can exploit this vulnerability against a vulnerable client. Compromised hosts may show little or no evidence in logs of compromise. Signatures have been released for multiple IDS/IPS systems which may identify Heartbleed traffic. A wide range of services and appliances could potentially use the vulnerable OpenSSL version. This vulnerability is not limited to web servers or https services. For example, proof of concept code exists for StartTLS (used to protect email server communications). Lists of vulnerable products are available such as [3, 4]. These should not be considered to be comprehensive and users should liaise with their vendors to ensure that they are aware of impact to deployed products. The range of products that could potentially be affected includes network appliances and other infrastructure equipment. When assessing the potential impact of this event, users need to consider their own circumstances. SSL/TLS termination points will have an effect on the potential information which may have been or could be exposed as a result of this vulnerability. This will also impact on what external stakeholders might be impacted and users will need to carefully consider what they may need to communicate to external parties. While there is presently no reliable indicator of compromise signatures of potential attack traffic are emerging. Where users have historic network traffic captures available they may wish to consider the use of available signatures to process historic traffic. This may give some indication of previous compromise. The situation regarding this vulnerability is very fluid with its exact scope and the products affected still being assessed. Users are advised to closely monitor vendor information and be prepared to act to reduce their vulnerability. Specific recommendations CERT Australia suggests users consider the following specific mitigations to protect against this cyber security risk: Where possible, users should update OpenSSL to version 1.0.1g as soon as possible. Where an upgrade is not possible, it may be possible to instead recompile OpenSSL with the -DOPENSSL_NO_HEARTBEATS flag. Any software that uses OpenSSL would also need to be restarted. For web services, users could consider the use of a reverse proxy service or similar service to act as an SSL end point between vulnerable servers and the internet. Once the OpenSSL implementation has been made safe users should consider generating new keys, obtaining new certificates and revoking previous certificates and keys. Passwords used to access the affected service should be reset only after previous steps have been completed. Cached cookies and session identifiers should be purged from browsers. It may not be immediately clear whether a particular system uses a vulnerable version of the software and users should review systems to obtain visibility on the use of OpenSSL as a third party component in other systems. Many vendors are moving to patch vulnerable systems. Users should liaise with vendors to apply patches where available. Detection signatures are becoming available for IDS/IPS systems. Users check with their particular vendor and should consider use of these where possible. General recommendations CERT Australia suggests users consider the following general mitigations to protect against this and other cyber security risks: Take measures to minimise network exposure for all control system devices. Critical devices should not be directly exposed to the internet. Locate control system networks and remote devices behind firewalls and isolate them from the business network. When remote access is required, use secure methods such as Virtual Private Networks (VPNs) with two factor authentication. Monitor intrusion detection and/or prevention systems, user logs and server logs for suspicious behaviour. Use defence-in-depth methods in system design to restrict and control access to individual products and control networks. Use application white-listing to only allow specifically authorised applications to operate on networks. This mitigation helps prevent malicious software or unauthorised applications from executing. Ensure applications and operating systems are kept up-to-date with the latest software patches. Ensure users are restricted from, or are administratively prohibited from installing unauthorised software and browsing the internet with administrator privileges. Remove, disable, or rename any default system accounts wherever possible. Implement account lockout policies to reduce the risk from brute forcing attempts. Enforce strong passphrase policies to reduce the risk from brute forcing attempts. Monitor the creation of administrator level accounts by third-party vendors. Ensure computer systems are running antivirus software with the latest antivirus signatures. For other mitigation please refer to the “Strategies to mitigate targeted electronic intrusions” publication. [5] Links [1] http://www.rfc-editor.org/rfc/rfc6520.txt [2] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 [3] http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=7209 51&SearchOrder=4 [4] https://www.cert.fi/en/reports/2014/vulnerability788210.html [5] https://www.cert.gov.au/faq Feedback CERT Australia (the CERT) welcomes any feedback you may have with regard to this publication and/or the services we provide – info@cert.gov.au or 1300 172 499. Note: information sent to the above email address will be in the clear and not secure. Secure communication channels for sensitive information are available on request. Report an incident Reporting cyber incidents allows us to form a more accurate view of cyber security threats and make sure that businesses receive the right help and advice. All information provided to us is held in the strictest confidence. Secure communication channels for sensitive information are available on request. Business partners who suspect they have been the victim of cyber crime are encouraged to report it to the Australian Federal Police. Cyber crime involves the unauthorised access to or impairment of computer systems and is likely to constitute an offence under the Commonwealth’s Criminal Code Act 1995 and/or state and territory criminal laws. About us The CERT is the national computer emergency response team. We are the single point of contact for cyber security issues affecting major Australian businesses. The CERT is part of the Federal Attorney-General’s Department, with offices in Canberra and Brisbane. We also work in the Cyber Security Operations Centre, sharing information and working closely with the Australian Security Intelligence Organisation (ASIO), the Australian Federal Police (AFP) and the Australian Signals Directorate (ASD). In addition, we work closely and share information with our international counterparts. This means we are very well connected and informed, so we are best placed to help businesses protect themselves from cyber attacks. Traffic Light Protocol (TLP)