February 29, 2016 By Douglas Bonderud 2 min read

File it under hardly surprising: New research from High-Tech Bridge (HTB) found that 90 percent of all SSL VPN servers are “hopelessly insecure.” As noted by The Register, the firm scanned more than 10,000 publicly available virtual private network (VPN) servers for common vulnerabilities and uncovered everything from outdated SSL protocols to bad certificates and weak encryption.

Put simply, there’s a disconnect here: Providers talk big about scoring secure connections and Internet anonymity, but most have missed the mark.

Serious Flaws in SSL VPNs

HTB’s scan of VPNs — selected randomly from the 4 million IPv4 addresses available and hosted by some of the world’s largest vendors — revealed a number of disturbing trends. For example, 77 percent of all SSL VPN servers tested use SSLv3 protocol despite the fact that it’s two decades old and contains a number of serious flaws.

More worrisome is that 1 percent of the VPNs tested use SSLv2. Three out of four VPNs relied on untrusted SSL certificates, making it possible for attackers to launch man-in-the-middle (MitM) attacks. Thankfully, this one’s easy to avoid: Companies just need to upgrade from the default certificate installed by their vendor.

When it comes to encryption, over 40 percent of servers use 1024-bit keys for RSA certificates, considered much less secure than their 2048-bit cousins. Conducting financial transactions is also hit or miss on VPNs since just 3 percent are compliant with PCL DSS or NIST guidelines for handling credit card or secure government data. And saving the best for last: 10 percent of servers scanned are still using versions of OpenSSL vulnerable to Heartbleed. Yikes.

Significant Reach

For most IT professionals and even private users, the revelation that VPNs aren’t as secure as promised isn’t exactly earth-shattering. It’s important, however, because virtual private server technology is quickly becoming one of the most popular forms of online privacy and anonymity.

As noted by Ars Technica, for example, the spread of VPNs has led multiple governments to draft legislation that either blocks or empowers these services, while streaming video services such as Netflix are taking steps to block VPNs from accessing country-specific versions of its content. The sheer number of providers and Internet pipelines, however, makes this a losing battle for any government or corporation; eventually, VPNs will win the day.

The problem? VPNs may not be secure. In addition to the large-scale issues reported by HTB, there are vulnerabilities that compromise specific security appliances and servers. As noted by PCWorld, for example, Cisco recently patched a critical issue with its ASA firewalls configured to act as VPNs, which allowed remote attackers to gain full control.

Ultimately, the growing use of VPNs to protect business data and consumer privacy, combined with an evolving tech landscape where getting to market first often means grabbing the lion’s share of consumer interest, has led to a strange reversal: Services designed to deliver secure connections are failing to meet this most basic goal. With 90 percent of SSL VPN servers categorized as “hopeless,” it’s time for a dose of reality. In many cases, opting for virtual privacy means virtually nothing.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today