OpenSSL releases update to address Vulnerabilities
The OpenSSL project has released version 3.0.7, a security update for two vulnerabilities in OpenSSL 3.0.x. These vulnerabilities, CVE-2022-3786 and CVE-2022-3602, affect version 3.0.x and do not impact OpenSSL 1.1.1 or LibreSSL. Organizations are urged to ensure that they patch any instances of OpenSSL 3 in their software stack as a matter of urgency. SentinelOne customers can use Singularity XDR to ensure their organization is ready for the OpenSSL 3 update.
OpenSSL is an open-source cryptography library widely used by applications, operating systems and websites to secure communications over the internet using SSL and TLS. The majority of OpenSSL implementations in use today use version 1.1.1 or 1.0.2; however, OpenSSL 3 is bundled with many flavors of Linux and is also used in popular development software like Gradle, privacy tools such as TOR and security platforms like Kali Linux.
OpenSSL version 3.0.0 and higher are vulnerable to CVE-2022-3786 and CVE-2022-3602, which are patched in version 3.0.7. The downgrade was a result of the bugs being more difficult to exploit than at first thought. Despite the downgrading, a rating of “high” still represents a risk. Organizations running exposed version of OpenSSL are still advised to ensure the update is applied.
In 2014, OpenSSL suffered from a critical vulnerability, dubbed Heartbleed, which was due to a buffer over-read in the TLS Heartbeat Extension. Despite the patch being available the same day the flaw was disclosed, many were slow to patch. The bug was used to compromise a number of websites and steal sensitive data, including Social Insurance Numbers belonging to Canadian taxpayers.
To prepare and patch the OpenSSL 3 vulnerabilities, organizations need to prioritize discovering and patching CVE-2022-3786 and CVE-2022-3602 as soon as possible. The update to 3.0.7 was made available on Tuesday 1st November. SentinelOne customers can run queries to determine which endpoints are running vulnerable versions of OpenSSL in the management console.
In conclusion, vulnerabilities in a software library like OpenSSL are fundamental to the security of data on the internet and should not be overlooked or delayed. Organisations and IT teams need to ensure that they prioritise discovering and patching vulnerabilities as soon as possible to avoid potential breaches. Here at One2Call we proactively work to patch vulnerabilities as soon as they are discovered and we can work with your business to ensure that you stay protected.
Latest News Stories
Ransomware Attacks show a small dip, But is it the “Calm Before The Storm”?
Ransomware attacks saw a nearly 25% decline in April of this year, according to the latest monthly Cyber Threat Intelligence Report by NCC Group, a UK-based information assurance firm. While the decline is encouraging, the figures remain worryingly high, with 352...
BBC Panorama Report finds 6 year old security flaw in Hikvision Cameras
A recent BBC Panorama investigation (video available here with the segment regarding this story available between 11:57- 20:48) has uncovered security vulnerabilities in two of the world's leading manufacturers of surveillance cameras, Hikvision and Dahua, both of...
US State Department Announces $10 Million Bounty for Information on Clop Ransomware Attacks
In an intensified effort to combat cyber crime, the US State Department's Rewards for Justice (RFJ) programme has revealed a bounty of up to $10 million for information linking the recent Clop ransomware attacks to a foreign government. The announcement follows a wide...
Our Customers
Testimonials
Pauline, Khepera Business Park
Tenant is very satisfied. They were impressed by Adam’s knowledge and helpfulness.
John Cardy, Farmstar
Ryan was very helpful, I felt that I had wasted his time but he was very understanding.
John Griffiths, Acclaimed Family Law
Personal touch ,easy to deal with ,thank you.