More than 1,600 cloud-based applications are vulnerable to the Poodle flaw.
According to Netskope, while it was seeing fewer detections of the flaw in version 3.0 of the SSL protocol every day, there were still 1,632 vulnerable cloud applications as of Wednesday. A week before, on the 16th and two days after the flaw was first revealed, the number of vulnerable apps was 3,562, and this dropped to 2,754 a day later.
The number has continued to drop since. Ravi Balupari, director, engineering and cloud security research at Netskope, said that it continuously monitors thousands of SaaS apps and its preliminary analysis found that many apps were still vulnerable due to their current support SSL V 3.0.
“We’re recommending that they turn-off the support for SSL V 3.0 and to watch for anomalous behaviours on any other network protection devices (e.g., IPS), such as using SSL V 3.0 flows with CBC mode and huge number of connection failures or web server error messages in a very short period of time,” he said. He recommended that users turn-off or disable the use of SSL V 3.0 in client programs such as browsers.
Earlier this week, Apple iOS 8.1 came out and according to Paul Ducklin from Sophos, the main vulnerability fixed in iOS 8.1 is Poodle. “Poodle teaches us an important lesson about cryptography: backwards compatibility with outdated protocols is a bad idea, because it forces us to live with the risks of the past,” Ducklin said.
TK Keanini, CTO of Lancope, said: “At the highest level of internet traffic engineering, bad actors are always trying to divert traffic in a way that they can get in the middle but for national telecom providers, it is a given.”
Our next webcast will take place on Thursday 30th October at 11am, where CISOs Amar Singh and Craig Goodwin will talk about the impact of and fixing major threats such as Heartbleed, Shellshock and Poodle. https://www.brighttalk.com/webcast/11399/131731