SSL and TLS protocol-based vulnerabilities - Shezartech
post-template-default,single,single-post,postid-11395,single-format-standard,mkd-core-1.0.2,sparks child-child-ver-1.0.0,sparks-ver-1.5,mkd-smooth-scroll,mkd-smooth-page-transitions,mkd-ajax,mkd-grid-1300,mkd-blog-installed,mkd-header-standard,mkd-sticky-header-on-scroll-down-up,mkd-default-mobile-header,mkd-sticky-up-mobile-header,mkd-dropdown-default,mkd-header-style-on-scroll,mkd-full-width-wide-menu,mkd-header-standard-in-grid-shadow-disable,wpb-js-composer js-comp-ver-6.0.3,vc_responsive

SSL and TLS protocol-based vulnerabilities

Mobile applications and their backend servers communicate with each other over a network. Secured Socket Layer (SSL) and Transport Layer Security (TSL) protocols are most commonly used for authentication and security. Even though the Data is encrypted, these protocols have a few vulnerabilities. It is possible to intercept a message if an older version of a protocol is used, as older encryption algorithms are easy to decipher. One such vulnerability is narrated below.

A mobile application sends a request to its backend server. An impersonator intercepts the communication and acts as a server. The attacker gets the mobile app to agree upon using an older version of the protocol that is exploitable. Once accepted, the app would apply the protocol to the messages. As the intruder already has access to the data, all which is left is to exploit a known vulnerability and gain access to the transmitted information. The encryption methodology used in the protocol may be easy to undo, allowing the attacker to decrypt the traffic.

The remedy is to disable support for the older version of SSL and TLS protocols. Stronger encryption algorithms like ‘AEAD cypher’ should be used. Data compression should be avoided.