fbpx
Blog October 17, 2014

POODLE Vulnerability Security Notification

Yet another hacker attack, called “POODLE” is making headlines. Connectria’s security team put together a reference guide for mitigating this risk. Whether or not you are a Connectria customer we hope this information is helpful in keeping your data secure and prevents it from falling into the wrong hands.

The CVE 2014-3566 SSL v3.0 POODLE vulnerability affects servers still running SSL 3.0. It centers on cipher block chaining (CBC) encryption implementations that can allow attackers with a Man-in-the-Middle (MITM) position to view the contents of an encrypted transmission. POODLE takes advantage of the fact that when a secure connection attempt fails, servers will fall back to older protocols, such as SSLv3, in attempt to once again communicate securely with the remote client, which helps prevent further issues. To engage, an attacker who can trigger a connection failure then has the ability to force the use of SSLv3 and attempt POODLE, the newest attack method.

Here are some recommended actions you can take:

  1. Disable SSL 3.0 support or disable SSL 3.0 CBC-mode ciphers. Use the following site https://www.poodletest.com to detect if SSL 3.0 is enabled on the client side (Please visit the site from the system that is being tested) and use https://www.ssllabs.com/ssltest/index.html or http://www.poodlebleed.com.
  2. Implement the proper use of TLS_FALLBACK_SCSV to remediate the forced downgrade issue that is part of the vulnerability.
  3. Check for latest news and information at these corresponding resources:

The POODLE vulnerability cannot be mitigated by a patch.  The mitigation will possibly require a reboot of your system.  Your cloud provider should be performing network scans to identify potential exposure, however you are the best resource for validating that your systems are protected.

Do you have specific questions on this security threat? Post a comment below and we’ll do our best to get back to you with a detailed answer.

Connectria Hosting remains committed to ensuring our customers are protected and staying abreast of the latest security vulnerabilities. Are you currently receiving the same type of service level from your current cloud hosting provider? If not, we should talk.

Related Resources

 
Protect Your Clients, Their Customers, AND Yourself with Regulation Compliant Hosting
For many businesses, compliance is an essential component of what you do and how you protect your customers. Whether you’re in the healthcare sector, financial…
 
Who Does HIPAA Protect? And What Does This Mean for Your IT Team?
Many experts are eager to point out the what and the how of HIPAA compliance: What protected health information (PHI) is included, how it needs…
 
Small Businesses & PCI – What You Need to Know
Running a business in today’s digital-laden and data-driven world requires compliance with various federal regulations. Depending on the industry and the type of data that…