{"id":29476,"date":"2015-03-06T07:41:40","date_gmt":"2015-03-06T12:41:40","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/microsoft-windows-vulnerable-to-freak-encryption-flaw-too.php"},"modified":"2015-03-06T07:41:40","modified_gmt":"2015-03-06T12:41:40","slug":"microsoft-windows-vulnerable-to-freak-encryption-flaw-too","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/microsoft-windows-vulnerable-to-freak-encryption-flaw-too.php","title":{"rendered":"Microsoft Windows vulnerable to &#8216;FREAK&#8217; encryption flaw too"},"content":{"rendered":"<p><p>  Previously thought limited to Apple and Google browsers, the flaw  leaves communications between affected users and websites open to  interception.<\/p>\n<p>    Windows machines are also    vulnerable to a decade-old encryption flaw.  <\/p>\n<p>    Computers running all supported releases of Microsoft Windows    are vulnerable to \"FREAK,\" a decade-old encryption flaw that    leaves device users vulnerable to having their electronic    communications intercepted when visiting any of hundreds of    thousands of websites, including Whitehouse.gov, NSA.gov and    FBI.gov.  <\/p>\n<p>    The flaw was previously thought to be limited to Apple's    Safari and Google's Android    browsers. But Microsoft warned that the encryption protocols    used in Windows -- Secure Sockets Layer and its successor    Transport Layer Security -- were also vulnerable to the flaw.  <\/p>\n<p>    \"Our investigation has verified that the vulnerability could    allow an attacker to force the downgrading of the cipher suites    used in an SSL\/TLS connection on a Windows client system,\"    Microsoft said in its advisory.    \"The vulnerability facilitates exploitation of the publicly    disclosed FREAK technique, which is an industrywide issue that    is not specific to Windows operating systems.\"  <\/p>\n<p>    Microsoft said it will likely address the flaw in its regularly    scheduled Patch Tuesday update or with an out-of-cycle patch.    In the meantime, Microsoft suggested disabling the RSA export    ciphers.  <\/p>\n<p>    The FREAK (Factoring RSA Export Keys) flaw     surfaced a few weeks ago when a group of researchers    discovered they could force websites to use intentionally    weakened encryption, which they were able to break within a few    hours. Once a site's encryption was cracked, hackers could then    steal data such as passwords, and hijack elements on the page.  <\/p>\n<p>    Researchers said there was no evidence hackers had exploited    the vulnerability, which they blamed on a former US policy that    banned US companies from exporting the strongest encryption    standards available. The restrictions were lifted in the late    1990s, but the weaker standards were already part of software    used widely around the world, including Windows and the web    browsers.  <\/p>\n<p>    \"The export-grade RSA ciphers are the remains of a    1980s-vintage effort to weaken cryptography so that    intelligence agencies would be able to monitor,\" Matthew Green,    a Johns Hopkins cryptographer who helped investigate the    encryption flaw, wrote in a blog post    explaining the flaw's origins and effects. \"This was done    badly. So badly, that while the policies were ultimately    scrapped, they're still hurting us today.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.cnet.com\/news\/windows-vulnerable-to-freak-encryption-flaw-too\" title=\"Microsoft Windows vulnerable to 'FREAK' encryption flaw too\">Microsoft Windows vulnerable to 'FREAK' encryption flaw too<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Previously thought limited to Apple and Google browsers, the flaw leaves communications between affected users and websites open to interception. Windows machines are also vulnerable to a decade-old encryption flaw. Computers running all supported releases of Microsoft Windows are vulnerable to \"FREAK,\" a decade-old encryption flaw that leaves device users vulnerable to having their electronic communications intercepted when visiting any of hundreds of thousands of websites, including Whitehouse.gov, NSA.gov and FBI.gov. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-29476","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29476"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29476"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29476\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}