Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Security Encryption

Heartbleed Used To Bypass 2-Factor Authentication, Hijack User Sessions 59

wiredmikey (1824622) writes "Security nightmares sparked by the Heartbleed OpenSSL vulnerability continue. According to Mandiant, now a unit of FireEye, an attacker was able to leverage the Heartbleed vulnerability against the VPN appliance of a customer and hijack multiple active user sessions. The attack bypassed both the organization's multifactor authentication and the VPN client software used to validate that systems connecting to the VPN were owned by the organization and running specific security software.

"Specifically, the attacker repeatedly sent malformed heartbeat requests to the HTTPS web server running on the VPN device, which was compiled with a vulnerable version of OpenSSL, to obtain active session tokens for currently authenticated users," Mandiant's Christopher Glyer explained. "With an active session token, the attacker successfully hijacked multiple active user sessions and convinced the VPN concentrator that he/she was legitimately authenticated."

After connecting to the VPN, the attacker attempted to move laterally and escalate his/her privileges within the victim organization, Mandiant said."
This discussion has been archived. No new comments can be posted.

Heartbleed Used To Bypass 2-Factor Authentication, Hijack User Sessions

Comments Filter:
  • by Severus Snape ( 2376318 ) on Saturday April 19, 2014 @01:27PM (#46795299)

    This doesn't negate the fact that this was their favorite vulnerability. Realistically most intelligence services probably new about this shortly after that commit.

    How so was it their "favorite vulnerability"? Is there even a shread of evidence linking them with it? Exploits exist in code - we found a big bad one - great. Many white hats will have looked at the code and not noticed the flaw. That doesn't mean the NSA were using it. I'm not for a moment saying the NSA wouldn't use a similar exploit but there's nothing special about Heartbleed.

  • by Nanoda ( 591299 ) on Saturday April 19, 2014 @01:38PM (#46795359)

    News: Not just webservers use OpenSSL!

    No kidding. My Synology NAS had a same-day update to patch this - my custom router firmware needed updating too. If there's a story for every device someone forgot might contain OpenSSL code, it's going to be a busy month.

  • by BitcoinBenny ( 3025373 ) on Saturday April 19, 2014 @02:22PM (#46795579)

    I don't think so. This is a high value vulnerability, you keep it in the back pocket. Especially since it has demonstrated key extrication and affects a large number of hardware and software platforms.

Reactor error - core dumped!