Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

Free Scanning Tool Promises To Find Heartbleed On Any Device

CrowdStrike says tool identifies the flaw on web servers, VPNs, servers, routers, printers, and phones.

CrowdStrike Friday released a free scanning tool that it says can find the Heartbleed vulnerability on any device that runs OpenSSL.

While a number of free scanning tools have been released since the serious Heartbleed vulnerability was disclosed earlier this month, most of them only scan for the bug on an external web server or a single device, notes Dmitri Alperovitch, co-founder and CTO of CrowdStrike in a blog about the free tools.

Some of the previously-released free tools have also come under fire for failing to detect Heartbleed in all instances. In a blog posted on the Internet Storm Center Monday, researcher Pedro Bueno said scanning tools may not always find the flaw.

CrowdStrike's tool can not only consistently identify the flaw on Web servers, but can find it on OpenSSL virtual private networks, Secure FTP servers, email servers, routers, printers, phones, or any other device that uses OpenSSL, Alperovitch says.

"In addition to the ability to show the list of vulnerable servers, the scanner also outputs the contents of the the 64Kb of memory that a vulnerable server returns back to the Heartbeat SSL request, allowing you to see the extent of the impact of this vulnerability on your devices and services," his blog states.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/22/2014 | 9:33:19 AM
Narrowing the Scope
I have not yet tested this tool but it seems very impressive. I would imagine their method of scanning is proprietary but I would be interested to see why, according to the article, their scanner can support these functionalities and why other scanners are failing to detect. Also, has anyone tested this tool and in the results of the scan will it provide you with the verion of OpenSSL or only the version with Heartbleed? The main functionality of this scanner is the Heartbleed vulnerability but from a business standpoint it would be helpful to quickly identify servers via a scanner.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/22/2014 | 12:52:40 PM
Re: Narrowing the Scope
I hsve to second Ryan's call for someone to report on their experience with this tool. Is it working as promosed?
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
4/22/2014 | 9:26:52 PM
Re: Narrowing the Scope
I have already tested my corporate environment using both the Nessus Heart Bleed plugin (http://www.tenable.com/plugins/index.php?view=single&id=73412) and this python script (https://gist.github.com/eelsivart/10174134) as well as actually attempting to exploit random machines with this exploit (http://www.exploit-db.com/exploits/32791/)

In all of my testing all three methods found the same machines vulnerable.  Tomorrow I will use the crowdstrike tool and compare the results.  I will report back then.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
4/23/2014 | 12:51:20 PM
Testing of Tool
After testing the CrowdStrike tool I can confirm that it was able to identify all of the servers I was able to identify previously.  However, at least in my environment, it did not identify any new servers which were vulnerable.
DarkReadingTim
100%
0%
DarkReadingTim,
User Rank: Strategist
4/23/2014 | 1:32:41 PM
Heartbleed scanners -- good step for the community
While there has been some criticism of the free Heartbleed scanners' ability to catch every instance of the vulnerability, I think it's worth giving the vendors some kudos for their efforts. Several of the free tools came out within days of the vulnerability disclosure, and most of the tools that were rolled out were at no cost. The tools may not be perfect, but it's good to see the community responding quickly to a big problem without necessarily looking to make a buck on it.
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-36394
PUBLISHED: 2021-06-22
pam_setquota.c in the pam_setquota module before 2020-05-29 for Linux-PAM allows local attackers to set their quota on an arbitrary filesystem, in certain situations where the attacker's home directory is a FUSE filesystem mounted under /home.
CVE-2021-32699
PUBLISHED: 2021-06-22
Wings is the control plane software for the open source Pterodactyl game management system. All versions of Pterodactyl Wings prior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intende...
CVE-2021-32700
PUBLISHED: 2021-06-22
Ballerina is an open source programming language and platform for cloud application programmers. Ballerina versions 1.2.x and SL releases up to alpha 3 have a potential for a supply chain attack via MiTM against users. Http connections did not make use of TLS and certificate checking was ignored. Th...
CVE-2021-32701
PUBLISHED: 2021-06-22
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid an...
CVE-2021-22382
PUBLISHED: 2021-06-22
Huawei LTE USB Dongle products have an improper permission assignment vulnerability. An attacker can locally access and log in to a PC to induce a user to install a specially crafted application. After successfully exploiting this vulnerability, the attacker can perform unauthenticated operations. A...