On Tuesday, October 14th, Google researchers, Bodo Möller, Thai Duong and Krzysztof Kotowicz discovered a subtle but significant security weakness in version 3.0 of the SSL protocol. This bug, CVE-2014-3566, is being referred to as POODLE – Padding Oracle On Downgraded Legacy Encryption and is said to have a severity level of Medium. Although this particular vulnerable version of SSL is approximately 15 years old, it is still widely used and supported on most browsers. As a result, this vulnerability has the potential of affecting a significant number of individuals and organizations.
Transport Layer Security (TLS) and its predecessor, SSL 3.0, are commonly used to encrypt data between a user and their web server and provide a secure connection for the user. If a secure connection between the browser and the web server cannot be negotiated using the most updated version of TLS, it will downgrade to make the connection using an older version of SSL such as SSL 3.0. This is where the problem starts because the flaw in SSL 3.0 essentially allows hackers to gain access to encrypted information such as HTTP cookies used in the session.
This vulnerability is not as critical as Shellshock or Heartbleed. However, it is important to fix this issue as this puts all sensitive data such as bank account information, login information, emails and more at risk of being exposed to hackers.
Check Point Customers
Non Check Point Customers
To learn more about this vulnerability, please visit: