May 21, 2015 By Shane Schick 2 min read

Web browsers, email servers and Web servers used by a significant percentage of the online population may be at risk of a recently uncovered flaw called Logjam, which cybercriminals could use to collect weakly encrypted data traffic and quickly decode it, a team of researchers has warned.

A website called WeakDH.org has been set up to help computer users test their Web browsers for the flaw, which will be indicated by a red warning banner. Logjam was first described in a research paper published by a team that included researchers from Microsoft, INRIA, Johns Hopkins University, the University of Michigan and the University of Pennsylvania. The “dh” in the site name refers to Diffie-Hellman, a set of algorithms that process secure connections via encryption keys. The flaw lies in the nearly 20-year-old Secure Sockets Layer (SSL) protocol. If present, it could force Web servers to use 512-bit encryption keys rather than the stronger versions typical of most sites today.

As CSO Online explained, Logjam’s origins may be traced back to government policies that prohibited strong encryption in products as part of a national security policy. Though such policies were changed long ago, some sites still use 512-bit encryption, and browsers continue to support them so users don’t experience access issues.

Computerworld, meanwhile, noted that Logjam is different from the factoring RSA export keys exploit, otherwise known as the FREAK flaw, because while the latter merely opened a hole of sorts, this new vulnerability can be used to manipulate Web servers to make weak encryption appear stronger.

Microsoft has already dealt with Logjam on Internet Explorer, while Google spokespeople told The Wall Street Journal a patch for Chrome would arrive in the coming weeks. That still leaves Firefox and Safari vulnerable, not to mention the onerous process of testing Web and email servers.

Although there is obviously cause for concern, an expert interviewed by Tom’s Guide suggested the risk for Logjam may be minimal because it requires an attacker to be on the same public network as the potential victim. Given how often businesspeople are doing work in coffee shops and similar environments, however, it’s better to be on the safe side and make sure those Internet connections are as secure as we often assume they are.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today