May 21, 2015 By Shane Schick 2 min read

Web browsers, email servers and Web servers used by a significant percentage of the online population may be at risk of a recently uncovered flaw called Logjam, which cybercriminals could use to collect weakly encrypted data traffic and quickly decode it, a team of researchers has warned.

A website called WeakDH.org has been set up to help computer users test their Web browsers for the flaw, which will be indicated by a red warning banner. Logjam was first described in a research paper published by a team that included researchers from Microsoft, INRIA, Johns Hopkins University, the University of Michigan and the University of Pennsylvania. The “dh” in the site name refers to Diffie-Hellman, a set of algorithms that process secure connections via encryption keys. The flaw lies in the nearly 20-year-old Secure Sockets Layer (SSL) protocol. If present, it could force Web servers to use 512-bit encryption keys rather than the stronger versions typical of most sites today.

As CSO Online explained, Logjam’s origins may be traced back to government policies that prohibited strong encryption in products as part of a national security policy. Though such policies were changed long ago, some sites still use 512-bit encryption, and browsers continue to support them so users don’t experience access issues.

Computerworld, meanwhile, noted that Logjam is different from the factoring RSA export keys exploit, otherwise known as the FREAK flaw, because while the latter merely opened a hole of sorts, this new vulnerability can be used to manipulate Web servers to make weak encryption appear stronger.

Microsoft has already dealt with Logjam on Internet Explorer, while Google spokespeople told The Wall Street Journal a patch for Chrome would arrive in the coming weeks. That still leaves Firefox and Safari vulnerable, not to mention the onerous process of testing Web and email servers.

Although there is obviously cause for concern, an expert interviewed by Tom’s Guide suggested the risk for Logjam may be minimal because it requires an attacker to be on the same public network as the potential victim. Given how often businesspeople are doing work in coffee shops and similar environments, however, it’s better to be on the safe side and make sure those Internet connections are as secure as we often assume they are.

More from

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today