Komodia Redirector with SSL Digestor installs non-unique root CA certificates and private keys, making systems broadly vulnerable to HTTPS spoofing
Description
Komodia Redirector SDK is a self-described "interception engine" designed to enable developers to integrate proxy services and web traffic modification (such as ad injection) into their applications. With the SSL Digestor module, HTTPS traffic can also be manipulated. This is accomplished by installing a root CA certificate into browser trusted certificate stores, enabling the proxy to effectively man-in-the-middle all web traffic without raising any flags for the end-user. In multiple applications implementing Komodia's libraries, such as Superfish Visual Discovery and KeepMyFamilySecure, the root CA certificates have been found to use trivially obtainable, publicly disclosed, hard-coded private keys. Note that these keys appear to be distinct per application, though the same methods have proven successful in revealing the private keys in each instance. |
Impact
An attacker can spoof HTTPS sites and intercept HTTPS traffic without triggering browser certificate warnings in affected systems. |
Solution
The CERT/CC is currently unaware of any official solutions to this problem and recommends the following workarounds. |
Uninstall Komodia Redirector SDK and associated root CA certificates |
Vendor Information (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
Atom Security, Inc | Affected | 20 Feb 2015 | 20 Feb 2015 |
KeepMyFamilySecure | Affected | 19 Feb 2015 | 20 Feb 2015 |
Komodia | Affected | 19 Feb 2015 | 20 Feb 2015 |
Kurupira | Affected | - | 20 Feb 2015 |
Lavasoft | Affected | 20 Feb 2015 | 20 Feb 2015 |
Lenovo | Affected | 19 Feb 2015 | 20 Feb 2015 |
Qustodio | Affected | 19 Feb 2015 | 20 Feb 2015 |
Superfish | Affected | 19 Feb 2015 | 20 Feb 2015 |
Websecure Ltd | Affected | 20 Feb 2015 | 20 Feb 2015 |
If you are a vendor and your product is affected, let us know.
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | 8.5 | AV:N/AC:L/Au:N/C:C/I:P/A:N |
Temporal | 8.1 | E:H/RL:W/RC:C |
Environmental | 8.6 | CDP:LM/TD:H/CR:ND/IR:ND/AR:ND |
References
- http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html
- http://www.komodia.com/ad-injection-sdk/
- https://filippo.io/Badfish/
- https://blog.filippo.io/komodia-superfish-ssl-validation-is-broken/
- http://news.lenovo.com/article_display.cfm?article_id=1929
- https://forums.lenovo.com/t5/Lenovo-P-Y-and-Z-series/Lenovo-Pre-instaling-adware-spam-Superfish-powerd-by/m-p/1863174#M79882
- https://forums.lenovo.com/t5/Lenovo-P-Y-and-Z-series/Removal-Instructions-for-VisualDiscovery-Superfish-application/ta-p/2029206
- http://news.lenovo.com/article_display.cfm?article_id=1929&cid=ww:social:147924660:147924659:TWITTER:lenovo:*%20Customer%20Service%20and%20Support&linkId=12450493
- http://www.komodia.com/wiki/index.php/Komodia%27s_Redirector
- http://www.komodia.com/wiki/index.php/SSL_Digestor
- http://www.keepmyfamilysecure.com/about/
- http://www.komodia.com/wiki/index.php/Komodia%27s_Redirector#When_do_I_need_the_SSL_Digestor.3F
- http://marcrogers.org/2015/02/19/lenovo-installs-adware-on-customer-laptops-and-compromises-all-ssl/
Credit
The CERT/CC wishes to thank the following for their contributions to this report:
Mark Rogers, https://twitter.com/marcwrogers
Rob Graham, https://twitter.com/erratarob
Twitter user TheWack0lian https://twitter.com/TheWack0lian
Chris Palmer, https://twitter.com/fugueish
Filippo Valsorda, https://twitter.com/FiloSottile
This document was produced as a collaborative effort of the CERT/CC Vulnerability Analysis team.
'취약점 정보2' 카테고리의 다른 글
Microsoft EMET 5.2 is available (0) | 2015.03.16 |
---|---|
Lenovo Superfish Adware Vulnerable to HTTPS Spoofing (0) | 2015.02.21 |
DNS-based DDoS (0) | 2015.02.21 |
Update to kippo-log2db.pl (0) | 2015.02.09 |
BURP 1.6.10 Released (0) | 2015.02.09 |