Attacks/Breaches
9/7/2012
12:05 PM
Connect Directly
RSS
E-Mail
50%
50%

Microsoft Warns Of Looming Digital Certificate Deadline

To improve Windows security, a Microsoft security update soon will block access to RSA digital certificates that have a key length of less than 1,024 bits.

11 Security Sights Seen Only At Black Hat
11 Security Sights Seen Only At Black Hat
(click image for larger view and for slideshow)
Memo from Microsoft to Windows administrators: Make sure all of your digital certificates have at least 1,024 bits.

That warning comes as Microsoft prepares to release an automatic security update for Windows on Oct. 9, 2012, that will make longer key lengths mandatory for all digital certificates that touch Windows systems.

Notably, Internet Explorer won't be able to access any website secured using an RSA digital certificate with a key length of less than 1,024 bits. Likewise, without a strong enough certificate, certificate authority service in Windows won't be able to start, ActiveX controls might be blocked, users might not be able to install applications, and Outlook 2010 won't be able to encrypt or digitally sign emails, or communicate with an Exchange server for SSL/TLS communications. In addition, Microsoft warned that after its security update, Operations Manager will be unable to monitor--or discover new instances of--any HP-UX PA-RISC computers that don't have an RSA digital certificate of least 1,024 bits.

Microsoft's move reflects the relative ease with which digital certificates of less than 1,024 bits can now be cracked--or derived--via brute-force attacks. "The private keys used in these certificates can be derived and could allow an attacker to duplicate the certificates and use them fraudulently to spoof content, perform phishing attacks, or perform man-in-the-middle attacks," according to Microsoft.

[ Read Cryptographers Discover Public Key Infrastructure Flaw. ]

The "fix" for keeping up with Microsoft's mandatory security improvement is simple. "For those who find they are using certificates with RSA key lengths of less than 1,024 bits, those certificates will be required to be reissued with at least a 1,024-bit key length," according to a Microsoft Security Resource Center blog post. It also noted that "1,024 should, by the way, be considered a minimum length; the most up-to-date security practices recommend 2048 bits or even better."

Microsoft's security update is available now for download. The company recommends that IT administrators gain familiarity with it, and test any existing processes that might break, before it releases the update via Microsoft Update in October. To help, a Microsoft knowledgebase article, Microsoft Security Advisory: Update for minimum certificate key length details tips and techniques for discovering any digital certificates in use that have a key length of less than 1,024, as well as recommendations for updating them.

The timing of Microsoft's digital certificate spring cleaning has no doubt been driven by the Flame malware, discovered in May, and inside which security experts found built a "collision attack" against the Microsoft Terminal Services encryption algorithm, which allowed the malware to successfully spoof that Windows service and automatically install itself on targeted PCs.

In the eyes of Marc Stevens, a crypto-analyst at the Centrum Wiskunde and Informatica (CWI) in Amsterdam who studied Flame, whoever created that collision attack was practicing "world-class cryptanalysis." But when it comes to malware attacks, what's leading edge quickly becomes commonplace, as known attack techniques get emulated by other attackers, and included as automated options in crimeware toolkits and the open source Metasploit penetration testing toolkit.

Mobile employees' data and apps need protecting. Here are 10 ways to get the job done. Also in the new, all-digital 10 Steps To E-Commerce Security special issue of Dark Reading: Mobile technology is forcing businesses to rethink the fundamentals of how their networks work. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
9/8/2012 | 9:00:13 PM
re: Microsoft Warns Of Looming Digital Certificate Deadline
This isn't being accelerated due to Flame.

Sure, it makes the situation sound more dire because there's a (relatively) new threat out there that could take advantage of the inherent vulnerability involved in using shorter keys, but this has been around for a while.

Microsoft has been writing about this on TechNet for a while (see: A Note on Implementation of the Requirement to Issue Longer Key Length Certificates (December 7, 2010)). This revocation of 1024-bit keys has to do with NIST Special Publication 800-131A.

So, no, Microsoft isn't screaming about the sky falling because of Flame or the Terminal Services problem that was known about a while ago... it has to do with Federal cryptographic regulations. And this is something that any Windows Administrator worth their weight in salt has already implemented a remediation plan for.

Andrew Hornback
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant