F5 Load Balancers Hit by Ticketbleed Bug Exposing Sensitive Data
Researcher Reza Javanmardi has uncovered a significant vulnerability, dubbed Ticketbleed, in F5 load balancers. This bug exposes sensitive data like private keys, posing a security risk. The issue, similar to the Heartbleed bug but less severe, has sparked immediate action from SSL Labs.
The Ticketbleed bug, discovered by Javanmardi, affects F5 devices due to a software flaw that always responds with 32 bytes of data, regardless of the client's submission. This occurs when session tickets are used, and clients send an arbitrary string of one to 32 bytes as the session ID. As a result, attackers can potentially retrieve up to 31 bytes of process memory.
Filippo Valsorda, who reported the problem to F5 and coordinated its disclosure, notes that while Ticketbleed is similar to Heartbleed, it allows for the extraction of much less data. SSL Labs has already added Ticketbleed detection to its production servers and will fail servers found with the issue in the next release.
The Ticketbleed vulnerability in F5 load balancers, discovered by Reza Javanmardi, poses a security risk by exposing sensitive data. SSL Labs has taken immediate action to detect and address the issue, with more technical information available from Filippo Valsorda's published webpages.
Read also:
- Trump announces Chinese leader's confirmation of TikTok agreement
- U.S. Army Europe & Africa Bolsters NATO, African Partnerships in Phase Zero
- SpaceX & T-Mobile Activate Starlink for Hurricane Helene Connectivity
- Hackers Utilize GOLD SALEM to Infiltrate Networks and Evade Security Measures, Deploying Warlock Ransomware