Vulnerabilities / Threats
6/2/2014
11:41 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

SSL: Security's Best Friend Or Worst Enemy?

A new report shows that applications using SSL are on the rise in enterprises, putting them at greater risk of attacks that hide in plain sight or use vulnerabilities like Heartbleed.

A new report out today shows that applications that use SSL are on the rise in the enterprise, and that even businesses that are aware of the risks introduced by SSL aren't necessarily aware of the scale of potential problems.

The findings from the 11th annual Palo Alto Networks Application Usage and Threat Report show that around 34% of applications in use within the enterprise today use or can use the SSL to encrypt their traffic. Designed to survey the real applications running in the enterprise, it also shows the disparity between enterprise IT leaders' perception of their use of applications and the actual usage patterns or properties of applications scattered across organization. This year, the report studied 5,500 real-world environments and found approximately 2,100 applications running within these environments. Among those, 539 were SSL-capable.

As one of the core components of today's Internet ecosystem, SSL has greased the axle of Internet communication for key transactions like e-commerce and collaborative sharing applications, says Ryan Olson, head of threat intelligence for Palo Alto.

"Without having a sort of ubiquitous encryption protocol that is easy for people to implement, we wouldn't really be able to have any secure communication across the Internet," Olson says. However, the heightened level of privacy afforded by SSL encryption also brings with it a dark side.

"We certainly have a trade-off from a network perspective," he says, explaining that attackers increasingly use SSL to hide malicious traffic in plain sight from security inspection mechanisms. For example, he explains that variants of Zeus and other banking Trojans use SSL to hide command and control traffic from security devices. Similarly, the report pointed to the variant of the BlackPOS Trojan used to steal 100 million Target customer records, which used SSL to move information around using netbios shares and steal it through FTP.

"A lot of organizations are aware of this problem, but not as many as we think should be," he says. "The best way to deal with SSL is to do selective decryption of SSL traffic. We don't want to decrypt everything -- it's not really appropriate, and you don't want to invade the privacy of users in an inappropriate way. But many organizations don't do this for any applications at all. For applications which you have no idea what they are, you definitely want to have some visibility into what they are."

This is not a new problem, but it is a growing one as the number of SSL-capable applications rises within the enterprise. According to Palo Alto, the ratio grew by nearly 10 percentage points in the past year.

"I definitely don't see this decreasing over time, and it becomes even more difficult for organization as the total volume of SSL traffic increases. If you have a slice of your overall traffic you're ignoring because you're not inspecting it, as that slice grows larger the percentage of traffic that's going to include malicious behavior is going to increase proportionally," Olson says. 

Further increasing the threat is what Olson calls the long-term risks of Heartbleed, which are unknown and unpatched client-side applications vulnerable to the OpenSSL Heartbleed vulnerability. As he explains, many websites have gone through the proper stages of patching the vulnerability, reissuing certificates, and asking their users to reset their passwords. But there exists a whole world of client-side applications that organizations might not even know exist in their networks that could still be vulnerable to Heartbleed.

"Instant message application and any client-side application that could include some sort of browser in it might include OpenSSL," he says, "And it might be one of those 500-plus applications in the enterprises that can use SSL."

Palo Alto reported that "a lot of eyebrows were raised" as customers looked at the report's results. In many specific enterprise instances, the percentage of SSL-capable applications running in environments was much higher than 30%, sometimes pushing above 50% of applications in use.

"So, identifying all the applications in your network that are using SSL and figuring out if they use Open SSL is really the long tail of Heartbleed," Olson warns.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2010-5110
Published: 2014-08-29
DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.

CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

CVE-2014-0600
Published: 2014-08-29
FileUploadServlet in the Administration service in Novell GroupWise 2014 before SP1 allows remote attackers to read or write to arbitrary files via the poLibMaintenanceFileSave parameter, aka ZDI-CAN-2287.

CVE-2014-0888
Published: 2014-08-29
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.