US-CERT Sees Danger Lurking in SSL-VPN


Netstat -vat by Sean Michael Kerner (bio)

A command line view of IT



security-200x180-redlock_small.jpg

“From the ‘Flaws Without Fixes files”

US-CERT is now warning against a potentially dangerous flaw in the SSL-VPN implementations from over two dozen vendors including industry giant Cisco.



“Clientless SSL VPN products from multiple vendors operate in a way that breaks fundamental browser security mechanisms,” US-CERT warns. “An attacker could use these devices to bypass authentication or conduct other Web-based attacks.”



Sounds scary, doesn’t it? But I’m not so sure we all need to run for the hills and abandon SSL-VPNs (yet).

At issue is the same origin policy that all modern Web browsers use. Same origin is basically an attempt to limit the resources that can access data from a particular site. That is, you generally don’t want one site having access to the other sites you have open.


[Continue reading this blog post at Netstat -vat by Sean Michael Kerner]

Get the Free Newsletter!

Subscribe to our newsletter.

Subscribe to Daily Tech Insider for top news, trends & analysis

News Around the Web