February 29, 2016 By Douglas Bonderud 2 min read

File it under hardly surprising: New research from High-Tech Bridge (HTB) found that 90 percent of all SSL VPN servers are “hopelessly insecure.” As noted by The Register, the firm scanned more than 10,000 publicly available virtual private network (VPN) servers for common vulnerabilities and uncovered everything from outdated SSL protocols to bad certificates and weak encryption.

Put simply, there’s a disconnect here: Providers talk big about scoring secure connections and Internet anonymity, but most have missed the mark.

Serious Flaws in SSL VPNs

HTB’s scan of VPNs — selected randomly from the 4 million IPv4 addresses available and hosted by some of the world’s largest vendors — revealed a number of disturbing trends. For example, 77 percent of all SSL VPN servers tested use SSLv3 protocol despite the fact that it’s two decades old and contains a number of serious flaws.

More worrisome is that 1 percent of the VPNs tested use SSLv2. Three out of four VPNs relied on untrusted SSL certificates, making it possible for attackers to launch man-in-the-middle (MitM) attacks. Thankfully, this one’s easy to avoid: Companies just need to upgrade from the default certificate installed by their vendor.

When it comes to encryption, over 40 percent of servers use 1024-bit keys for RSA certificates, considered much less secure than their 2048-bit cousins. Conducting financial transactions is also hit or miss on VPNs since just 3 percent are compliant with PCL DSS or NIST guidelines for handling credit card or secure government data. And saving the best for last: 10 percent of servers scanned are still using versions of OpenSSL vulnerable to Heartbleed. Yikes.

Significant Reach

For most IT professionals and even private users, the revelation that VPNs aren’t as secure as promised isn’t exactly earth-shattering. It’s important, however, because virtual private server technology is quickly becoming one of the most popular forms of online privacy and anonymity.

As noted by Ars Technica, for example, the spread of VPNs has led multiple governments to draft legislation that either blocks or empowers these services, while streaming video services such as Netflix are taking steps to block VPNs from accessing country-specific versions of its content. The sheer number of providers and Internet pipelines, however, makes this a losing battle for any government or corporation; eventually, VPNs will win the day.

The problem? VPNs may not be secure. In addition to the large-scale issues reported by HTB, there are vulnerabilities that compromise specific security appliances and servers. As noted by PCWorld, for example, Cisco recently patched a critical issue with its ASA firewalls configured to act as VPNs, which allowed remote attackers to gain full control.

Ultimately, the growing use of VPNs to protect business data and consumer privacy, combined with an evolving tech landscape where getting to market first often means grabbing the lion’s share of consumer interest, has led to a strange reversal: Services designed to deliver secure connections are failing to meet this most basic goal. With 90 percent of SSL VPN servers categorized as “hopeless,” it’s time for a dose of reality. In many cases, opting for virtual privacy means virtually nothing.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today