• Solutions
    • Networking & Infrastructure
    • Collaboration & Customer Experience
    • Data Center & Multi Cloud
    • Cybersecurity & Public Safety
  • Services
    • Consulting Services
    • Professional Services
    • Warpcom Command Center
      • Network Operations Center (NOC)
      • Security Operations Center (SOC)
      • Support Services
  • Warpdev
  • Partners
  • Resources & News
    • News
    • Blog
    • E-Books
  • Who We Are
    • About Us
    • Mission, Vision, and Values
    • Why Warpcom
    • Management Team
    • (APCER) Certifications
    • Career Opportunities
    • Contacts
  • Client Portal
  • Contacts
  • pt-ptPT
  • esES
  • enEN
Warpcom | together with you.
Warpcom | together with you.
  • Language
    • pt-ptPT
    • esES
    • enEN
  • Client Portal
  • Contacts
  • Solutions
    • Networking & Infrastructure
    • Collaboration & Customer Experience
    • Data Center & Multi Cloud
    • Cybersecurity & Public Safety
  • Services
    • Consulting Services
    • Professional Services
    • Warpcom Command Center
      • Network Operations Center (NOC)
      • Security Operations Center (SOC)
      • Support Services
  • Warpdev
  • Partners
  • Resources & News
    • News
    • Blog
    • E-Books
  • Who We Are
    • About Us
    • Mission, Vision, and Values
    • Why Warpcom
    • Management Team
    • (APCER) Certifications
    • Career Opportunities
    • Contacts

ROBOT Attack

Warpcom | together with you. > Resources & News > News > Warp Info > ROBOT Attack
ROBOT Attack
ROBOT Attack
15 December, 2017 Gonçalo Alberto

ROBOT Attack

On 12 December 2017, a research paper entitled “Return of Bleichenbacher’s Oracle Threat” (ROBOT) was made publicly available. ROBOT is the return of a 19-year-old vulnerability which, under some circumstances, may allow for traffic decryption and server identity theft (websites).

Affected systems:
To date, vulnerable implementations from Cisco, Citrix, F5, Oracle, Radware and open-source projects, such as Bouncy Castle, Erlang and WolfSSL, have already been identified.

Researchers have also examined Alexa’s top 100 domains and concluded that 27 of those subdomains host vulnerable websites, including popular websites, such as Facebook and Paypal.

To check whether your system has been affected, take this simple test: https://robotattack.org/#check

 

Recommendation:

  • Carry out a vulnerability analysis;
  • Disable TLS RSA cyphers;
  • Apply safety patches and other specific recommendations from manufacturers.

 

Links that provide relevant information in relation to the recent occurrence:

https://robotattack.org/

https://robotattack.org/#patches

https://robotattack.org/#check

http://www.kb.cert.org/vuls/id/144389

 

Vulnerability management within organisations is a complex task. Warpcom’s portfolio offers solutions that help organisations with their vulnerability management. In this context, we highlight our partnership with Tenable and its Tenable.io solutions, as well as the Tenable Security Center.

Paulo Rosa
Security & Public Safety
Business Unit Manager

15 December, 2017
Share on Facebook
Facebook
Share on LinkedIn
Linkedin

Subscrição de Conteúdos

Related Articles

Warp Info
Ransomware
22 May, 2017
Warp Info
Ransomware
28 June, 2017

Where are we ?

Lisboa

Estrada de Alfragide, 67
Alfrapark - Edifício F - Piso 3
2610-008 Amadora

t +351 214 169 500

f +351 214 169 518

Porto

Rua Brigadeiro Nunes da Ponte, 114 R/C A4
4150-036 Porto

t +351 225 192 700

f +351 225 192 708

Faro

Rua Prof. Alberto Uva, 25,
8000-176 Faro
 

t +351 289 359 100

f +351 289 359 109

Funchal

Rua Princesa D. Amélia, 22, Lj 9
9000-019 Funchal
 

t +351 291 238 004

Madrid

C/Manuel Tovar, 42 – 2º,
Edificio Meeting Point,
28034 Madrid  

t +34 91 125 42 10

Follow Us

  • Privacy policy and cookies
  • Site map
  • Who We Are
ISO 45001
Este website utiliza cookies para melhorar a sua experiência de utilização. Ao continuar a navegação no website estará a consentir o seu uso.OKSaiba mais