POODLE Attack (CVE-2014-3566)

Description

During the scan, Kayran managed to detect a Poodle Attack vulnerability.
The Poodle Attack allow you to retrieve encrypted data sent by the client to a server if the Transport Layer Security being used is SSLv3.

If an attacker interrupts a secure connection between a browser and the website that is using TLSv1.0, and, when the browser retries to establish a connection to the server, it will use the next lower level protocol, once the protocol downgrade is successful, the attacker can exploit the vulnerabilities in SSLv3 to compromise the session.

The POODLE threat is a Man-In-The-Middle type of attack that forces modern clients and servers to downgrade the security protocol to SSLv3 from TLSv1.0 or higher.
This is done by interrupting the “handshake” between the client and server, resulting in the retry of the handshake with earlier protocol versions.

Severity/Score

CVSS Version 3.x – 3.4 Low

Recommendation

Disable SSLv3 within your web server and/or client (ideally both).
This will make the exploitation of the vulnerability impossible for the attacker.

References

https://marc.info/?l=bugtraq&m=142103967620673&w=2

https://cwe.mitre.org/data/definitions/310.html

< Return to all Vulnerabilities

The Cloud

I’m pretty sure there isn’t a single adult in the world who hasn’t at least heard of The Cloud. Explaining “The Cloud” in 2022 may

Read More »