POODLE Attack (CVE-2014-3566)

Description

During the scan, Kayran managed to detect a Poodle Attack vulnerability.
The Poodle Attack allow you to retrieve encrypted data sent by the client to a server if the Transport Layer Security being used is SSLv3.

If an attacker interrupts a secure connection between a browser and the website that is using TLSv1.0, and, when the browser retries to establish a connection to the server, it will use the next lower level protocol, once the protocol downgrade is successful, the attacker can exploit the vulnerabilities in SSLv3 to compromise the session.

The POODLE threat is a Man-In-The-Middle type of attack that forces modern clients and servers to downgrade the security protocol to SSLv3 from TLSv1.0 or higher.
This is done by interrupting the “handshake” between the client and server, resulting in the retry of the handshake with earlier protocol versions.

Severity/Score

CVSS Version 3.x – 3.4 Low

Recommendation

Disable SSLv3 within your web server and/or client (ideally both).
This will make the exploitation of the vulnerability impossible for the attacker.

References

https://marc.info/?l=bugtraq&m=142103967620673&w=2

https://cwe.mitre.org/data/definitions/310.html

< Return to all Vulnerabilities

Servers 101

Let’s have a “quick” Servers 101 Course. Courtesy of Kayran! If you’ve been on the internet for over an hour, you probably already heard of

Read More »

HAR Files

In this article, I’ll talk and explain about HAR Files, so if you don’t know what they are, or, what do we use them for,

Read More »