ssl

Update: The bug has been fixed in OS X 10.9.2

Security consultant Aldo Cortesi said in a blog post (via ZDNet) that it took him less than a day to exploit the goto fail bug in OS X to capture all SSL traffic, and that there’s a good chance he isn’t the first to have done so – an implicit suggestion that the vulnerability may already be being used in man-in-the-middle attacks.

I’ve confirmed full transparent interception of HTTPS traffic on both IOS (prior to 7.0.6) and OSX Mavericks. Nearly all encrypted traffic, including usernames, passwords, and even Apple app updates can be captured. This includes:

  • App store and software update traffic
  • iCloud data, including KeyChain enrollment and updates
  • Data from the Calendar and Reminders
  • Find My Mac updates
  • Traffic for applications that use certificate pinning, like Twitter … 

The proof of concept was pulled together from information in the public domain. Cortesi said that he modified an existing man-in-the-middle proxy, mitmproxy, to exploit the bug. He tweeted a series of screenshots showing captured SSL data, including iCloud keychain traffic and data from software update.

It’s difficult to over-state the seriousness of this issue. With a tool like mitmproxy in the right position, an attacker can intercept, view and modify nearly all sensitive traffic. This extends to the software update mechanism itself, which uses HTTPS for deployment.

Cortesi says that he will not supply further details of how he achieved the interception until Apple has patched OS X.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

6 Responses to “Security consultant takes less than a day to exploit OS X bug to capture all SSL traffic”

  1. Then don’t use public access points, make sure you are on a known network. It’s one thing doing it in a lab but another in the real world

    Like

    • mockery17 says:

      10.9.2 can’t come soon enough. This is one of the few times I am not on the defensive side when it comes to Apple blunders.

      Like

    • Not a big issue. Make a fake access point for an open Wifi, that’s quick and could trick a lot of people.

      Like

    • I love your advice. People use macs because they’re simple to use and you don’t have to be a chip head to use one. You and I aren’t going to get caught up in this mess because we’re aware of it. How many people do you think, at this exact moment, are on their macbooks in a coffee shop, fast food restaurant, or wherever, and have NO CLUE this bug exists? That’s the issue.

      Like

      • And how many of those people would be going to secure websites that contain the ip address not a fqdn ? Not many I suspect. Yes there is a risk but lets keep it in context because we run the risk of crying wolf too many times.

        Like