Forum Thread: Exploiting Poodle (SSL3.0) Vulnerability

What is the worst way that this vulnerability can be exploited? and how is it done?

Our Best Hacking & Security Guides

New Null Byte posts — delivered straight to your inbox.

2 Responses

The POODLE attack can be used against any system or application that supports SSL 3.0 with CBC mode ciphers. This affects most current browsers and websites, but also includes any software that either references a vulnerable SSL/TLS library (e.g. OpenSSL) or implements the SSL/TLS protocol suite itself.

By exploiting this vulnerability in a likely web-based scenario, an attacker can gain access to sensitive data passed within the encrypted web session, such as passwords, cookies and other authentication tokens that can then be used to gain more complete access to a website (impersonating that user, accessing database content, etc.).

There is currently no fix for the vulnerability SSL 3.0 itself, as the issue is fundamental to the protocol; however, disabling SSL 3.0 support in system/application configurations is the most viable solution currently available.

Good answer, Cyberhitchhiker.

Share Your Thoughts

  • Hot
  • Active