Skip to content

Google, Mozilla, and OpenSSL Team Up to Combat POODLE Attack

The POODLE attack threatens web security. Google, Mozilla, and OpenSSL are fighting back with a new indicator to prevent downgrades to vulnerable SSL 3.

In this image there are three black dogś with leashes.
In this image there are three black dogś with leashes.

Google, Mozilla, and OpenSSL Team Up to Combat POODLE Attack

Google, Mozilla, and OpenSSL have joined forces to bolster web security by implementing support for the TLS_FALLBACK_SCSV indicator. This move aims to combat the POODLE attack, a critical vulnerability in the SSL 3 protocol. Websites and users are urged to take immediate action to protect themselves.

The POODLE attack, identified as CVE-2014-3566, exploits a flaw in the CBC encryption scheme of SSL 3. It's easier to execute than the 2011 BEAST exploit but still requires a Man-in-the-Middle (MITM) attack. Scott Helme's blog post offers detailed guidance on how to disable SSL 3 in various servers and browsers.

To mitigate this threat, Google announced support for the TLS_FALLBACK_SCSV feature in Chrome 30, released in October 2013. This indicator helps prevent browsers from being downgraded to SSL 3. SSL Labs has also improved its website to test and warn about the POODLE attack, giving a C grade to vulnerable servers.

To protect against the POODLE attack, websites must disable SSL 3 on their servers, and users should disable it in their browsers. Browser vendors are taking action, with Firefox 34 set to disable SSL 3. The TLS_FALLBACK_SCSV indicator, now supported by Google, Mozilla, and OpenSSL, provides an additional layer of security.

Read also:

Latest