Researchers Discover Vulnerabilities in Cryptographic Keys Used in Computer-to-Server SSH Traffic

https://icaro.icaromediagroup.com/system/images/photos/15878470/original/data?1699916770
ICARO Media Group
Politics
13/11/2023 23h05

For the first time, researchers have uncovered vulnerabilities in a large portion of cryptographic keys used to protect data in computer-to-server SSH (Secure Shell) traffic. These vulnerabilities could potentially lead to the complete compromise of the keys when computational errors occur during the connection establishment.

The significance of this discovery was emphasized by the researchers, who were able to calculate the private portion of almost 200 unique SSH keys that they observed in public Internet scans conducted over the past seven years. The researchers also express concerns that keys used in IPsec (Internet Protocol Security) connections may be susceptible to similar compromises.

SSH is a cryptographic protocol commonly employed in secure shell connections, allowing computers to remotely access servers, particularly in security-sensitive enterprise environments. IPsec, on the other hand, is a protocol used in virtual private networks (VPNs) to route traffic through an encrypted tunnel.

The identified vulnerability primarily affects keys that utilize the RSA cryptographic algorithm. The researchers found this algorithm in approximately one-third (roughly 1 billion) of the SSH signatures they examined, out of the total 3.2 billion signatures analyzed. Shockingly, about one in a million of these RSA signatures exposed the private key of the host.

While the percentage appears to be infinitesimally small, it remains a surprising revelation for several reasons. Firstly, most SSH software currently in use has implemented countermeasures for these vulnerabilities for many years. These countermeasures check for signature faults before sending a signature over the internet. Secondly, the discovery challenges previous beliefs that signature faults exclusively exposed RSA keys used in the TLS (Transport Layer Security) protocol, which encrypts web and email connections. Until now, researchers believed that SSH traffic was immune to such attacks because passive attackers, who observe traffic as it passes by, were unable to access all the necessary information during these errors.

The implications of these vulnerabilities are significant, as compromised cryptographic keys can potentially lead to unauthorized access, data breaches, and the loss of sensitive information. Researchers and industry professionals are now working to address these vulnerabilities and develop robust solutions to protect the integrity of cryptographic keys in SSH traffic and other secure protocols.

It is essential for organizations and users to stay updated with the latest security measures and patch their software regularly to mitigate the risks associated with these vulnerabilities.

The views expressed in this article do not reflect the opinion of ICARO, or any of its affiliates.

Related