Few days back security researchers group (named as SMACK ) made everyone aware of a new SSL/TLS vulnerability, termed as FREAK (CVE-2015-0204). FREAK stands for Factoring Attack on RSA-EXPORT Keys. After POODLE, it is another catastrophic SSL/TLS vulnerability. FREAK vulnerability enables malicious attackers to do the MITM attack between the vulnerable clients and servers on encrypted channel. Attackers are forcefully making sure that vulnerable clients and servers must use older and weaker ‘Export-grade’ cryptography. This export-grade encryption uses 512-bit RSA keys. This export-grade encryption can be easily decrypted and it’s very easy to hamper its integrity.
ROOT of the problem:
In 1990s, the US government endeavored to direct the export of items using “robust” encryption and gadgets were stacked with weaker “export-grade” encryption before being dispatched out of the nation. Around then, it was permitted a most extreme key length of 512 bits for “export-grade” encryption. Later in 2000, due to an amendment in US export laws, merchants were allowed to incorporate 128-bit ciphers in their items and were able to disseminate these everywhere throughout the world. The main issue is that “export-grade” cryptography backings was never evacuated and now after three decades, FREAK vulnerability, anticipatively making it easier for hackers and malicious attackers to interpret the site’s private key and decode passwords, login, and other delicate data from HTTPS associations.
OK, now let me know how it works:
According to Professor Matthew Green, cryptographer and research professor at Johns Hopkins University, to understand the working of FREAK it’s necessary to understand working of MITM attack:
If only server is vulnerable, it’s not guarantee that the attack will be successful. For the attack to be successful, both browser and server must have to support Export-grade cipher suites..not guarantee that the attack will be successful. For the attack to be successful, both browser and server must have to support Export-grade cipher suites.
How to check whether you are safe from FREAK attack or not?
Everyone is not vulnerable to FREAK attack. To check whether your browser is vulnerable to this attack or not, visit www.freakattack.com. If your browser is safe from FREAK attack, then it will prompt a message, ‘Good News! Your browser appears to be safe from the FREAK Attack!’, else it will prompt a Warning message that your browser is vulnerable to CVE-2015-0204. Best way to make yourself free from this attack is to update your browser.
Is there any similarity between FREAK and POODLE?
POODLE vulnerability stands for ‘Padding Oracle on Downgraded Legacy Encryption’. It allows malicious attackers to lower down the SSL/TLS communication to the possible weakest version. FREAK is similar to POODLE in a way that it affects those SSL/TLS implementations that supports and accepts export versions of protocols that uses RSA algorithm.
APPLE and GOOGLE plans to tackle FREAK:
Apple is planning to introduce fixes for Safari on OS X and iOS next week. On the other hand Google has already handed over patch to the concerned ones. Google is also planning to make sure that all the websites must disable the support for export certificates.
HTTPS Sites that support RSA Export Suites:
According to Alexa Top 10K, following are the some websites that support RSA Export suites as of Tuesday, March 3, 9:00 PM EST. This list is quite long; you can go for the full list at suites as of Tuesday, March 3, 9:00 PM EST. This list is quite long; you can go for the full list at https://freakattack.com/vulnerable.txt .
Alexa Rank Domain Address Tested
27 sohu.com 22.214.171.124
182 businessinsider.com 126.96.36.199
234 ppomppu.co.kr 188.8.131.52
243 smzdm.com 184.108.40.206
247 americanexpress.com 220.127.116.11
251 jabong.com 18.104.22.168
273 groupon.com 22.214.171.124
290 bloomberg.com 126.96.36.199
442 4shared.com 188.8.131.52
448 npr.org 184.108.40.206
519 hatena.ne.jp 220.127.116.11hatena.ne.jp 18.104.22.168
615 instructables.com 22.214.171.124
629 airtel.in 126.96.36.199airtel.in 188.8.131.52
649 kohls.com 184.108.40.206
767 adplxmd.com 220.127.116.11
795 mit.edu 18.104.22.168
799 tinyurl.com 22.214.171.124
808 suning.com 126.96.36.199
820 saramin.co.kr 188.8.131.52
891 vi-view.com 184.108.40.206
903 itau.com.br 220.127.116.11
951 huaban.com 18.104.22.168
959 zomato.com 22.214.171.124
960 nationalgeographic.com 126.96.36.199
999 marriott.com 188.8.131.52
1001 jobrapido.com 184.108.40.206
1029 forever21.com 220.127.116.11
1089 wiocha.pl 18.104.22.168wiocha.pl 22.214.171.124
1150 axisbank.com 126.96.36.199
1180 clarin.com 188.8.131.52
1236 mgid.com 184.108.40.206
1247 jcpenney.com 220.127.116.11
1261 wowhead.com 18.104.22.168
1297 gaana.com 22.214.171.124
1313 mtime.com 126.96.36.199
1360 refinery29.com 188.8.131.52
1361 vente-privee.com 184.108.40.206
1364 ynet.co.il 220.127.116.11
1383 dhgate.com 18.104.22.168
1411 vesti.ru 22.214.171.124vesti.ru 126.96.36.199
1424 adxcore.com 188.8.131.52
1456 sweet-page.com 184.108.40.206
1484 binaryprofessional.com 220.127.116.11
1502 globososo.com 18.104.22.168
1571 estadao.com.br 22.214.171.124
1573 jcrew.com 126.96.36.199
1586 17173.com 188.8.131.52
1599 bmi.ir 184.108.40.206bmi.ir 220.127.116.11
1620 zdnet.com 18.104.22.168
1646 accountonline.com 22.214.171.124
1662 umich.edu 126.96.36.199
1680 cornell.edu 188.8.131.52
1684 lg.com 184.108.40.206
1693 uludagsozluk.com 220.127.116.11
1722 yixun.com 18.104.22.168
1738 priceminister.com 22.214.171.124
1856 ibtimes.co.uk 126.96.36.199
1860 extra.com.br 188.8.131.52
1864 jiameng.com 184.108.40.206
1866 ihg.com 220.127.116.11
1878 miui.com 18.104.22.168
1902 syosetu.com 22.214.171.124
1915 thrillist.com 126.96.36.199
About the Author
MANISH KUMAR MISHRA E-Mail: email@example.com
(ISO27001,C|EH v8 certified Information Security professional)
MS in Cyber Law and Information Security
Institute: Indian Institute Of Information Technology (IIIT)- Allahabad
Edited by Pierluigi Paganini
(Security Affairs – Drones, Privacy)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.