ClickCease Experts warn of potential critical bugs in OpenSSL
Cybersecurity News,

Experts warn of potential critical bugs in OpenSSL

November 8, 2022
potential critical bugs in OpenSSL

Major operating system vendors, software publishers, email providers and technology companies that integrate OpenSSL into their products have been asked to prepare for a possible “critical” vulnerability in versions 3.0 and higher of almost all cryptographic library.

OpenSSL is a software library for applications that protects communication over computer networks from eavesdropping or identifying the party at the other end. It is mainly used by internet servers, most of which are HTTPS websites.

The patch to fix the yet to disclosed flaw in current versions of the technology will be released in a new version of OpenSSL (version 3.0.7) scheduled for Tuesday, November 1. Although the updated version of the technology will be released simultaneously with the release of the OpenSSL project, it will potentially leave millions of others with an imminent deadline to find and fix the vulnerability before attackers start exploiting it.

Researchers fear that the new vulnerability may be yet another Heartbleed bug. CVE-2014-0160, a Heartbleed vulnerability that was discovered in 2014, allows attackers to intercept Internet communications and steal data from services and users, and allow attackers to impersonate services and perform malicious activities that leave little trace to track their actions.

Anything that communicates securely with the Internet could potentially have OpenSSL built in. Besides software, hardware may also be affected.

The advance information provided by the OpenSSL project gives organizations time to prepare for it.

According to Mike Parkin, senior technical engineer at Vulcan Cyber, in the absence of exploit activity and related indicators of compromise, organizations should follow their normal change management process when a known update is on the way.

Since some organizations have already dealt with Heartbleed, they are expected to know where their OpenSSL installations are, as this is required by their vendor products for the update.

For John Barnbenek, chief threat hunter at Netenrich, one likely problem organizations need to prepare for is how to deal with end-of-life products for which updates are not available.

The sources for this piece are an article in DarkReading.

Summary
Experts warn of potential critical bugs in OpenSSL
Article Name
Experts warn of potential critical bugs in OpenSSL
Description
Users who integrate OpenSSL into their products have been asked to prepare for a possible "critical" vulnerability in versions 3.0 and higher
Author
Publisher Name
Tuxcare
Publisher Logo

TuxCare can help you reduce your risk window to data exfiltration and other cyber security threats.

TALK TO A CYBERSECURITY EXPERT

Expert knowledge of Linux security tips,
live patching education, and Cybersecurity news.

Stay updated with the latest news and announcements from TuxCare.com

Related Articles

Bahamut deploys fake VPN apps...

ESET researchers discovered an ongoing campaign by the Bahamut APT...

December 9, 2022

Windows Server updates causes LSASS...

A memory leak bug on Local Security Authority Subsystem Service...

December 8, 2022

1,650 malicious Docker Hub images...

After discovering malicious behaviors in 1,652 of 250,000 unverified Linux...

December 7, 2022

Arm’s Mali GPU driver flaws...

Despite fixes released by the chipmaker, a set of five...

December 6, 2022

RansomExx malware offers new features...

The APT group DefrayX has launched a new version of...

December 5, 2022

DuckDuckGo launches beta version of...

DuckDuckGo, a privacy-focused search engine, has added an App Tracking...

December 2, 2022

Resources

State of Enterprise Linux Cybersecurity ... Read More State of Enterprise Linux Cybersecurity ...
Dangerous remotely exploitable vulnerability ... Read More Dangerous remotely exploitable vulnerability ...
Securing confidential research data ... Read More Securing confidential research data ...
State of Enterprise Vulnerability Detection ... Read More State of Enterprise Vulnerability Detection ...
Demand for Rapid Risk Elimination for ... Read More Demand for Rapid Risk Elimination for ...
TuxCare Free Raspberry Pi Patching Read More TuxCare Free Raspberry Pi Patching