The innocuously named POODLE attack disclosed by a trio of security researchers at Google this week demonstrates how vendor efforts to maintain backward compatibility with old technologies can sometimes backfire in a big way.

POODLE, short for Padding Oracle on Downgraded Legacy Encryption, is an attack that takes advantage of a design weakness in SSLv3, an obsolete piece of encryption software that is still widely used by Web servers around the world.

Attack of the POODLE

Google’s Bodo Möller, Thai Duong and Krzysztof Kotowicz developed the attack to show how attackers could take advantage of the SSLv3 weakness to potentially steal authentication cookies from an Internet user’s browser and use them to access associated email or bank accounts.

POODLE will not allow attackers to steal user passwords, security blogger Robert Graham noted in an Errata Security blog post. However, it will allow them to use stolen session cookies to log in to the user’s online account.

“Thus, while you are at Starbucks, some hacker next to you will be able to post tweets in your Twitter account and read all your Gmail messages,” Graham wrote. “These are two examples — they really have near complete control over your accounts.”

The problem stems from the manner in which SSLv3 implements a method known as block ciphering to encrypt whole blocks of data or groups of bits. The vulnerability gives attackers a way to decrypt encrypted communications between a browser and a Web server essentially one byte at a time using repeated browser requests.

Theoretically, the vulnerability should at least be a nonissue for most Internet users because SSLv3 became obsolete some 15 years ago. It has been replaced with a renamed and more secure encryption protocol called Transport Layer Security (TLS). TLS has been refreshed twice since it was first introduced in 1999, and work has already begun on TLS 1.3, the latest revision of the protocol.

Doing the ‘Downgrade Dance’

However, many legacy Web servers still support SSLv3 because many Web users still use old Internet Explorer 6 browsers. When a browser using a newer version of TLS encounters a Web server using SSLv3, the browser will usually automatically revert to using SSLv3, using a process that researchers describe as a “downgrade dance.”

With the POODLE attack, the Google researchers showed how attackers could essentially trick a client browser and Web server into this dance and force them to use SSLv3, even if both sides support the most recent and most secure version of TLS.

To pull this office, an attacker would essentially need to have access to the Internet connection between a Web server and the user’s browser, according to Matthew Green, a research professor at Johns Hopkins University. The attackers would also need to be able to run JavaScript on the browser, he noted.

“Unfortunately, the attack is more practical than you might think,” Green said. “You should probably disable SSLv3 everywhere you can. Sadly, that’s not so easy for the average end user.”

Disabling SSLv3 on servers could be a major challenge for website operators as well because the move will prevent Internet Explorer 6 users from accessing their sites, the security researchers noted.

However, “disabling SSL 3.0 entirely right away may not be practical if it is needed occasionally to work with legacy systems,” the Google researchers noted in their blog.

Server operators and browser makers should also consider disabling the functionality that allows their products to roll back to SSLv3, they said. Google Chrome, for instance, already uses a mechanism called “TLS_FALLBACK_SCSV” that prevents attackers from downgrading TLS protections.

More from

Vulnerability resolution enhanced by integrations

2 min read - Why speed is of the essence in today's cybersecurity landscape? How are you quickly achieving vulnerability resolution?Identifying vulnerabilities should be part of the daily process within an organization. It's an important piece of maintaining an organization’s security posture. However, the complicated nature of modern technologies — and the pace of change — often make vulnerability management a challenging task.In the past, many organizations had to support manual integration work to get different security systems to ‘talk’ to each other. As…

How I got started: SIEM engineer

2 min read - As careers in cybersecurity become increasingly more specialized, Security Information and Event Management (SIEM) engineers are playing a more prominent role. These professionals are like forensic specialists but are also on the front lines protecting sensitive information from the relentless onslaught of cyber threats. SIEM engineers meticulously monitor, analyze and manage security events and incidents within an organization. They leverage SIEM tools to aggregate and correlate data, enabling them to detect anomalies, identify potential threats and respond swiftly to security…

Tequila OS 2.0: The first forensic Linux distribution in Latin America

3 min read - Incident response teams are stretched thin, and the threats are only intensifying. But new tools are helping bridge the gap for cybersecurity pros in Latin America.IBM Security X-Force Threat Intelligence Index 2023 found that 12% of the security incidents X-force responded to were in Latin America. In comparison, 31% were in the Asia-Pacific, followed by Europe with 28%, North America with 25% and the Middle East with 4%. In the Latin American region, Brazil had 67% of incidents that X-Force…

Cost of a data breach 2023: Geographical breakdowns

4 min read - Data breaches can occur anywhere in the world, but they are historically more common in specific countries. Typically, countries with high internet usage and digital services are more prone to data breaches. To that end, IBM’s Cost of a Data Breach Report 2023 looked at 553 organizations of various sizes across 16 countries and geographic regions, and 17 industries. In the report, the top five costs of a data breach by country or region (measured in USD millions) for 2023…