Intel, Ex IDF) Several products before Superfish Window Shopper, Awesome Screenshot extension All adware with image recognition capability Identify products and display related adverts. LOTS of complains online Installed by Lenovo on new consumer windows machines since Aug 2014
collect data and inject adverts. • SSL is a problem. • MITM is the solution. SSL is terminated on the app and airgapped. Browser negotiates SSL with the App, The App negotiates SSL with the origin. installs an unrestricted root CA in the system store signs fake certificates with the origin’s name to fool user & browser. performs limited certificate checks If origin certificate fails, uses verify_fail for fake cert to trigger warning Forgets to check “Alternate Names” - DOH.
TLS_RSA_DSS_EXPORT_WITH_DES40_CBC_SHA ??? TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ?? TLS_RSA_EXPORT_WITH_RC4_40_MD5 ?? Yes these are 40 bit export only keys.
App Extraction is trivial and takes a few minutes. Certificate is RSA-1024 with SHA1 But that isn’t even the worst bit….. private key password is company name! • Trivial to use this to generate certs for interception ◦ works for code signing too • This unrestricted private root also breaks pinning Finally, if affected you have no way of knowing if your connection is secure • Based on the ciphers being negotiated it probably isn’t.
the private key password “komodia” we looked at Komodia ◦ Komodia is a manufacturer of SSL interception products • Most of their apps appear to use the same SDK as superfish. • Some have Ring0 and some have Ring3 rootkits! • 14 different apps so far ◦ Parental Control Apps ◦ DLP apps ◦ Anti-malware and security apps (LOL) • Each product a different, unique, extractable fake root CA • Unsurprisingly all behave just like superfish ◦ All vulnerable to the Alternative Names spoof ◦ All private keys use the same key - Komodia
“DDoS” ◦ Allegedly. • Claim the design flaws were introduced by 3rd parties like superfish and all risks are theoretical anyway. • Apparently 14 different companies all introduced the same flaw independently.
App Extraction is trivial and takes a few minutes. Certificate is RSA-1024 with SHA1 But that isn’t even the worst bit….. private key password is company name! • Trivial to use this to generate certs for interception ◦ works for code signing too • This unrestricted private root also breaks pinning Finally, if affected you have no way of knowing if your connection is secure • Based on the ciphers being negotiated it probably isn’t.