Heartbleed bug: Businesses must act now…April 14 - 8am
To avoid severe impacts on enterprise servers, businesses must take action against the ‘Heartbleed’ bug, which is likely to be the single greatest vulnerability in history, according to Palo Alto Networks.
“Enterprise servers running enabled versions of OpenSSL could be severely impacted and in a worst-case scenario could expose end-user communication over SSL encryption,” says Gavin Coulthard, Manager Systems Engineering of Australia/New Zealand, Palo Networks.
“The news around the vulnerability is focused on the web perspective and how it affects https enabled websites. However, this is just the tip of the iceberg.
“What’s important is that any vulnerable SSL enabled service on a machine compromises the entire machine and its private keys.
“Large organisations cannot possibly know all of their public facing services. More than half of those will be SSL enabled.
“The only reliable way to ensure that none of them are exploitable is to deploy an enterprise-level firewall in front of them – such as a Palo Alto Networks next-generation firewall.”
Palo Alto Networks takes a fundamentally different approach to identify and work to prevent threats like ‘Heartbleed’ from infiltrating enterprises.
“Many security vendors are required to create an enormous amount of pattern-based signatures, in a constant battle to identify the tell-tale signs of exploitation,” Coulthard adds.
“Palo Alto Network’s security platform natively decodes all traffic at the application layer, regardless of the port and protocol used, including SSL/TLS tunnels.
“Instead of struggling to match a multitude of signatures against known patterns, we are able to quickly decompose the protocol (SSL in this case) to detect anomalies in ways that cannot be done with typical network security devices limited by regular expression technology.”
Palo Alto Networks recommends that all enterprises update their web servers to the latest patched version of OpenSSL available as of April 7 and immediately replace SSL private keys after the patch is in place.
Vendors and partners should also help their clients identify vulnerable systems and notify them immediately.