{"id":2875,"date":"2025-04-23T11:24:04","date_gmt":"2025-04-23T11:24:04","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2875"},"modified":"2025-04-23T11:24:04","modified_gmt":"2025-04-23T11:24:04","slug":"attackers-abused-a-bug-within-ssl-com-to-authorize-fake-certificates","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2875","title":{"rendered":"Attackers abused a bug within SSL.com to authorize fake certificates"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>A flaw in SSL.com\u2019s domain control validation (DCV) process allowed attackers to bypass verification and issue fraudulent SSL certificates for any domain linked to certain email providers.<\/p>\n<p>According to an exploit demonstrated by a security researcher going by the alias Sec Reporter, attackers could abuse SSL.com\u2019s misinterpretation of email-based validation methods.<\/p>\n<p>\u201cSSL.com failed to conduct accurate domain validation control when utilizing the BR 3.2.2.4.14 DCV method (Email to DNS TXT Contact),\u201c Sec Reporter said in a <a href=\"https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1961406\">BugZilla post<\/a>. \u201dIt incorrectly marks the hostname of the approver\u2019s email address as a verified domain, which is completely erroneous.\u201c<\/p>\n<p>SSL.com is a widely trusted certificate authority (CA) that issues <a href=\"https:\/\/www.csoonline.com\/article\/564131\/what-is-ssl-how-ssl-certificates-enable-encrypted-communication.html\">SSL\/TLS<\/a> certificates\u2013digital credentials that secure data transmitted between websites and users. A CA failing to properly check who owns a domain could allow issuance of fake certificates, leading to domain impersonation, data theft, <a href=\"https:\/\/www.csoonline.com\/article\/566905\/man-in-the-middle-attack-definition-and-examples.html\">man-in-the-middle<\/a>, and phishing attacks.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>SSL.com misvalidates random email addresses<\/h2>\n<p>SSL.com has a feature where one can prove they control a domain and get a TLS (SSL) certificate by creating a special DNS TXT record\u2013an email address for SSL.com to send a confirmation code to.<\/p>\n<p>In theory, only someone who controls the domain (like xyz@example.com) should be able to create this record and receive the verification email. However, in reality, SSL.com was mistakenly trusting just the domain part of the email address (example.com).<\/p>\n<p>This allowed Sec Reporter to enter admin@aliyun.com as the record, and SSL.com assumed they controlled aliyun.com (a webmail service run by Alibaba), validating their certificates for aliyun.com and www.aliyun.com.<\/p>\n<p>This is particularly dangerous as an attacker doesn\u2019t need to have complete control over a website, e.g. google.com, to get a legitimate-looking certificate, as just the email address of an employee or even a free email address that\u2019s somehow linked to the domain is enough.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Mis-issued certificates have been revoked<\/h2>\n<p>Sec Reporter\u2019s demonstration of the flaw was acknowledged by SSL.com, and the issue was promptly fixed.<\/p>\n<p>\u201cSSL.com acknowledges this bug report and we are investigating further,\u201d Rebecca Kelly, technical project manager at SSL.com, commented on the demonstration, quickly following with, \u201cOut of an abundance of caution, we have disabled domain validation method 3.2.2.4.14 that was used in the bug report for all SSL\/TLS certificates while we investigate.\u201d<\/p>\n<p>In a preliminary incident report attached in the comment section of the demonstration, it was revealed that a total of <a href=\"https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1961406#c6\">10 certificates<\/a> were mis-issued by SSL.com using the faulty method and were consequently revoked. These improperly issued certificates, with the exception of <a href=\"https:\/\/crt.sh\/?id=16452546552\">one<\/a>, were found to be non-fraudulent mis-issuance upon investigation, Kelly added. <\/p>\n<p>While CSO awaits response from SSL.com on the status of the one mis-issued certificate still not in the clear, major websites, including email and cloud providers, are advised to cross-check the entire list of mis-issued certificates to be extra vigilant.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>A flaw in SSL.com\u2019s domain control validation (DCV) process allowed attackers to bypass verification and issue fraudulent SSL certificates for any domain linked to certain email providers. According to an exploit demonstrated by a security researcher going by the alias Sec Reporter, attackers could abuse SSL.com\u2019s misinterpretation of email-based validation methods. \u201cSSL.com failed to conduct [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2876,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2875"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2875"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2875\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2876"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}