Looking for the vulnerability index of Invicti's legacy products?
The Heartbleed Bug - Vulnerability Database

The Heartbleed Bug

Description

The Heartbleed Bug (CVE-2014-0160) is a critical vulnerability in OpenSSL versions 1.0.1 through 1.0.1f that affects the TLS heartbeat extension implementation. This flaw allows remote attackers to read up to 64KB of process memory per request without authentication, potentially exposing sensitive data such as private keys, session tokens, passwords, and other confidential information. The vulnerability was introduced in December 2011 and remained undetected until April 2014, affecting millions of servers worldwide that relied on OpenSSL for SSL/TLS encryption. OpenSSL versions 1.0.0, 0.9.8, and 1.0.1g (released April 7, 2014) and later are not affected by this vulnerability.

Remediation

Take the following steps immediately to remediate this vulnerability:

1. Upgrade OpenSSL: Update to OpenSSL version 1.0.1g or later. For Debian/Ubuntu systems:

sudo apt-get update
sudo apt-get install openssl libssl1.0.0
For RedHat/CentOS systems:
sudo yum update openssl

2. Restart affected services: Restart all services that use OpenSSL (web servers, mail servers, VPN services, etc.):
sudo service apache2 restart
sudo service nginx restart

3. Revoke and reissue SSL/TLS certificates: Assume all private keys have been compromised. Generate new private keys and obtain new certificates from your certificate authority.

4. Reset credentials: Force password resets for all user accounts and invalidate existing session tokens, as credentials may have been exposed.

5. Monitor for suspicious activity: Review logs for unusual access patterns, though note that Heartbleed exploitation typically leaves no traces.

6. Verify the fix: Use online testing tools or scanners to confirm your systems are no longer vulnerable to Heartbleed attacks.

Related Vulnerabilities