Analytics // Threat Intelligence
08:55 AM
Tim Wilson
Tim Wilson
Quick Hits

Free Scanning Tool Promises To Find Heartbleed On Any Device

CrowdStrike says tool identifies the flaw on web servers, VPNs, servers, routers, printers, and phones.

CrowdStrike Friday released a free scanning tool that it says can find the Heartbleed vulnerability on any device that runs OpenSSL.

While a number of free scanning tools have been released since the serious Heartbleed vulnerability was disclosed earlier this month, most of them only scan for the bug on an external web server or a single device, notes Dmitri Alperovitch, co-founder and CTO of CrowdStrike in a blog about the free tools.

Some of the previously-released free tools have also come under fire for failing to detect Heartbleed in all instances. In a blog posted on the Internet Storm Center Monday, researcher Pedro Bueno said scanning tools may not always find the flaw.

CrowdStrike's tool can not only consistently identify the flaw on Web servers, but can find it on OpenSSL virtual private networks, Secure FTP servers, email servers, routers, printers, phones, or any other device that uses OpenSSL, Alperovitch says.

"In addition to the ability to show the list of vulnerable servers, the scanner also outputs the contents of the the 64Kb of memory that a vulnerable server returns back to the Heartbeat SSL request, allowing you to see the extent of the impact of this vulnerability on your devices and services," his blog states.

Tim Wilson is Editor in Chief and co-founder of Dark, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Strategist
4/23/2014 | 1:32:41 PM
Heartbleed scanners -- good step for the community
While there has been some criticism of the free Heartbleed scanners' ability to catch every instance of the vulnerability, I think it's worth giving the vendors some kudos for their efforts. Several of the free tools came out within days of the vulnerability disclosure, and most of the tools that were rolled out were at no cost. The tools may not be perfect, but it's good to see the community responding quickly to a big problem without necessarily looking to make a buck on it.
Robert McDougal
Robert McDougal,
User Rank: Ninja
4/23/2014 | 12:51:20 PM
Testing of Tool
After testing the CrowdStrike tool I can confirm that it was able to identify all of the servers I was able to identify previously.  However, at least in my environment, it did not identify any new servers which were vulnerable.
Robert McDougal
Robert McDougal,
User Rank: Ninja
4/22/2014 | 9:26:52 PM
Re: Narrowing the Scope
I have already tested my corporate environment using both the Nessus Heart Bleed plugin ( and this python script ( as well as actually attempting to exploit random machines with this exploit (

In all of my testing all three methods found the same machines vulnerable.  Tomorrow I will use the crowdstrike tool and compare the results.  I will report back then.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
4/22/2014 | 12:52:40 PM
Re: Narrowing the Scope
I hsve to second Ryan's call for someone to report on their experience with this tool. Is it working as promosed?
User Rank: Ninja
4/22/2014 | 9:33:19 AM
Narrowing the Scope
I have not yet tested this tool but it seems very impressive. I would imagine their method of scanning is proprietary but I would be interested to see why, according to the article, their scanner can support these functionalities and why other scanners are failing to detect. Also, has anyone tested this tool and in the results of the scan will it provide you with the verion of OpenSSL or only the version with Heartbleed? The main functionality of this scanner is the Heartbleed vulnerability but from a business standpoint it would be helpful to quickly identify servers via a scanner.
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-12
vpxd in VMware vCenter Server 5.0 before u3e, 5.1 before u3, and 5.5 before u2 allows remote attackers to cause a denial of service via a long heartbeat message.

Published: 2015-10-12
The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol.

Published: 2015-10-12
Cisco Unified Computing System (UCS) B Blade Server Software 2.2.x before 2.2.6 allows local users to cause a denial of service (host OS or BMC hang) by sending crafted packets over the Inter-IC (I2C) bus, aka Bug ID CSCuq77241.

Published: 2015-10-12
The process-management implementation in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows local users to gain privileges by terminating a supervised process and then triggering the restart of a process by the root account, aka Bug ID CSCuv12272.

Published: 2015-10-12
HP 3PAR Service Processor SP 4.2.0.GA-29 (GA) SPOCC, SP 4.3.0.GA-17 (GA) SPOCC, and SP 4.3.0-GA-24 (MU1) SPOCC allows remote authenticated users to obtain sensitive information via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.