Categories: Security

Kaspersky Lab Called Out For ‘Critical’ SSL Certificate Flaw

A major security flaw in Kaspersky Lab’s antivirus product which effectively disabled SSL certificate validation for 400 million users, has been uncovered by Google security researchers.

Writing on Google’s Project Zero issue tracker,  researcher Tavis Ormandy explains how Kaspersky was inserting its own certificate as a trusted authority by intercepting all outgoing HTTPS connections during the inspection of encrypted data.

The issue was that those certificates only used the first 32 bits of MD5 as the key in its SSL proxy, making them too weak to provide an adequate defence.

Software Bug

“Critical” bug

“Kaspersky’s certificate interception has previously resulted in serious vulnerabilities, but quick review finds many simple problems still exist. for example, the way leaf certificates are cached uses an extremely naive fingerprinting technique,” writes Ormandy.

“Kaspersky cache recently generated certificates in memory in case the user agent initiates another connection. In order to do this, Kaspersky fetches the certificate chain and then checks if it’s already generated a matching leaf certificate in the cache. If it has, it just grabs the existing certificate and private key and then reuses it for the new connection.

“You don’t have to be a cryptographer to understand a 32bit key is not enough to prevent brute-forcing a collision in seconds. In fact, producing a collision with any other certificate is trivial.”

Ormandy reported the “critical” bug on November 1, receiving confirmation from Kaspersky that it would be fixed “in the nearest future”. The issue was eventually resolved on December 28.

We contacted Kaspersky Lab for comment and received the following statement: “Kaspersky Lab would like to assure its customers that all the vulnerabilities linked to the processing of SSL certificates recently disclosed by Google Project Zero researcher Tavis Ormandy have been successfully fixed. Our specialists have no evidence that these or any of the previously disclosed vulnerabilities have been exploited in the wild.

“We would like to thank Mr. Tavis Ormandy for reporting these vulnerabilities to us in a responsible manner. The security of our customers is our top priority, which is why we take all reports about potential security issues seriously and always support the assessment of our solutions by independent researchers.”

Quiz: How much do you know about cybersecurity in 2016?

Sam Pudwell

Sam Pudwell joined Silicon UK as a reporter in December 2016. As well as being the resident Cloud aficionado, he covers areas such as cyber security, government IT and sports technology, with the aim of going to as many events as possible.

Recent Posts

Meta’s Community Notes To Use X’s Algorithm

Community Notes testing across Facebook, Instagram and Threads to begin next week in US, using…

1 hour ago

FTC Says It Has Resources To Pursue Amazon Case, In Major U-Turn

Complete 180. FTC attorney now says federal agency can pursuit Amazon trial, after citing “severe…

2 hours ago

Intel Appoints Chip Veteran Lip-Bu Tan As CEO

Former board member and respected chip industry veteran Lip-Bu Tan appointed to lead troubled US…

7 hours ago

Apple To Appeal UK Government Backdoor Order On Friday

MPs demand secret High Court hearing be held in public, after government had ordered a…

8 hours ago

FTC Seeks Delay To Amazon Trial, Citing Staff, Cash Shortfalls

Consequences. As Musk and DOGE continues slash-and burn at federal agencies, FTC asks for trial…

24 hours ago

Mobile Browser Market Not Working Well – CMA

Report from CMA's independent inquiry group concludes mobile browser markets not working well, but cloud…

1 day ago