{"id":74249,"date":"2015-01-13T18:46:46","date_gmt":"2015-01-13T23:46:46","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-24T14:50:50","modified_gmt":"2021-08-24T18:50:50","slug":"2014s-major-web-vulnerabilities","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/2014s-major-web-vulnerabilities\/","title":{"rendered":"2014&#8217;s Major Web Vulnerabilities"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20150926084842\/http:\/\/blogs.norman.com\/2012\/for-consumption\/new-malware-type-old-security-threat\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-106663 size-thumbnail\" title=\"2014's Major Web Vulnerabilities\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-17.jpg?resize=75%2C75&#038;ssl=1\" alt=\"2014's Major Web Vulnerabilities\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-17.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-17.jpg?w=116&amp;ssl=1 116w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a><strong>2014<\/strong> was the year of cyber-security\u00a0<strong>mega-vulnerabilities<\/strong>. What makes mega vulnerabilities unique are they strike at the <strong>core of the Internet<\/strong> infrastructure and can impact nearly every connected device and every Internet user on the globe. 2014 saw the emergence of three mega-vulnerabilities <strong>Hearbleed<\/strong>, <strong>Shellshock,<\/strong> and <strong>POODLE<\/strong>.<\/p>\n<p><a href=\"http:\/\/www.incapsula.com\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-106666\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/incapsula_logo.png?resize=150%2C31&#038;ssl=1\" alt=\"\" width=\"150\" height=\"31\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/incapsula_logo.png?resize=150%2C31&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/incapsula_logo.png?resize=75%2C15&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/incapsula_logo.png?w=218&amp;ssl=1 218w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><a title=\"Heartbleed\" href=\"https:\/\/web.archive.org\/web\/20201206014409\/https:\/\/mashable.com\/2014\/04\/11\/mashable-explains-heartbleed-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">Heartbleed<\/a>, <a title=\"Shellshock\" href=\"http:\/\/krebsonsecurity.com\/2014\/09\/shellshock-bug-spells-trouble-for-web-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Shellshock<\/a>, and <a title=\"POODLE\" href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-290A\" target=\"_blank\" rel=\"noopener noreferrer\">POODLE<\/a> were the top three major web vulnerabilities uncovered in 2014 <a title=\"Heartbleed, Shellshock and POODLE top the list of major web vulnerabilities \" href=\"https:\/\/web.archive.org\/web\/20151221123814\/http:\/\/www.fierceitsecurity.com:80\/story\/infographic-heartbleed-shellshcok-and-poodle-top-list-major-web-vulnerabili\/2014-12-09\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a> to <a title=\"Fred Donovan\" href=\"https:\/\/web.archive.org\/web\/20160605214122\/http:\/\/www.fierceitsecurity.com:80\/author\/fdonovan\" target=\"_blank\" rel=\"noopener noreferrer\">Fred Donovan<\/a> at\u00a0<em><a href=\"https:\/\/web.archive.org\/web\/20160729153456\/http:\/\/www.fierceitsecurity.com:80\/?\" target=\"_blank\" rel=\"noopener noreferrer\">FierceITSecurity<\/a>.<\/em>\u00a0In case you have not heard of this trio of troublemakers, Web security firm <a title=\"Incapsula\" href=\"http:\/\/www.incapsula.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Incapsula<\/a> produced the following infographic.<\/p>\n<p>The Incapsula infographic looks at each of these <strong>vulnerabilities<\/strong> and layout when they were discovered, what type of vulnerability they are, what systems and the number that are affected, the risks posed by the vulnerabilities, their severity, how easy they are to exploit, and the difficulty of fixing. <a title=\"Tim Matthews\" href=\"https:\/\/www.linkedin.com\/in\/timmatthews\" target=\"_blank\" rel=\"noopener noreferrer\">Tim Matthews<\/a>, vice president of marketing for Incapsula wrote in their <a title=\"Understanding the Mega-Vulnerabilities of 2014\" href=\"http:\/\/www.incapsula.com\/blog\/2014-mega-vulnerabilities.html\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a>:<\/p>\n<p style=\"padding-left: 30px;\"><em>What makes these mega vulnerabilities special is that unlike most vulnerabilities that are specific to a particular <a class=\"zem_slink\" title=\"Operating system\" href=\"http:\/\/en.wikipedia.org\/wiki\/Operating_system\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">OS<\/a>, browser or software application, these three relate to the core Internet infrastructure (e.g., <a class=\"zem_slink\" title=\"Transport Layer Security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">SSL<\/a> and <a class=\"zem_slink\" title=\"Linux-powered device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Linux-powered_device\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Linux devices<\/a>) and, in essence, affect just about every connected device owner and every Internet user on the globe.<\/em><\/p>\n<p><a href=\"http:\/\/www.incapsula.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-106669 size-large\" title=\"Incapsula 2014 Mega Vulnetabilities\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_2014-mega-vulnerabilities.png?resize=406%2C1024&#038;ssl=1\" alt=\"Incapsula 2014 Mega Vulnetabilities\" width=\"406\" height=\"1024\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_2014-mega-vulnerabilities.png?resize=406%2C1024&amp;ssl=1 406w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_2014-mega-vulnerabilities.png?resize=30%2C75&amp;ssl=1 30w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_2014-mega-vulnerabilities.png?resize=59%2C150&amp;ssl=1 59w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_2014-mega-vulnerabilities.png?w=598&amp;ssl=1 598w\" sizes=\"auto, (max-width: 406px) 100vw, 406px\" \/><\/a><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>In their blog, Incapsula warns this is the tip of the iceberg of mega-<a class=\"zem_slink\" title=\"Vulnerability (computing)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Vulnerability_%28computing%29\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">vuln<\/a>&#8216;s that exploit other structural core functions of the Intertubes. <a title=\"Wired\" href=\"http:\/\/www.wired.com\/2014\/12\/most-dangerous-software-bugs-2014\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wired<\/a> reports that after 8 months, 300,000 machines remain unpatched against Heartbleed.<\/em><\/p>\n<h6 class=\"zemanta-related-title\">Related articles<\/h6>\n<ul class=\"zemanta-article-ul\">\n<li class=\"zemanta-article-ul-li\">Web Freedom Is Seen as a Growing Global Issue (cacm.acm.org)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2014s top three web vulnerabilities were Heartbleed, Shellshock, and  POODLE which are still running loose.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,420,101,2341,2160,2247,2342,77,23,82,421,2159,2339,4,2340,305],"class_list":["post-74249","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-aapl","tag-apple","tag-bash","tag-heartbleed","tag-icloud","tag-incapsula","tag-internet","tag-malware","tag-microsoft","tag-msft","tag-openssl","tag-poodle","tag-security","tag-shellshock","tag-ssl"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/74249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=74249"}],"version-history":[{"count":10,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/74249\/revisions"}],"predecessor-version":[{"id":131037,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/74249\/revisions\/131037"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=74249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=74249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=74249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}