Generated by GPT-5-mini| Heartbleed | |
|---|---|
![]() | |
| Name | Heartbleed |
| Cve | CVE-2014-0160 |
| Discovered | April 2014 |
| Affected | OpenSSL |
| Severity | High |
| Type | Buffer over-read |
| Mitigation | Update OpenSSL, revoke keys, reissue certificates |
Heartbleed is a widely publicized security vulnerability affecting the OpenSSL cryptographic library that was disclosed in April 2014. The flaw permitted attackers to read portions of memory from affected servers, exposing sensitive data used by services run by organizations such as Google, Facebook, Yahoo!, Amazon, and Twitter. Publicity about Heartbleed spurred coordinated responses across technology companies, standards bodies, and national agencies including National Institute of Standards and Technology, Department of Homeland Security, and European Network and Information Security Agency.
The vulnerability existed in the OpenSSL project, a widely used implementation of the Transport Layer Security protocol and the predecessor Secure Sockets Layer. OpenSSL is deployed by web servers such as Apache HTTP Server, nginx, and Lighttpd, as well as by operating systems including Debian, Ubuntu, Red Hat Enterprise Linux, CentOS, FreeBSD, and Microsoft Windows Server via third-party packages. The codebase for OpenSSL was maintained by contributors associated with organizations like the OpenBSD community, the Linux Foundation, and the Internet Engineering Task Force. Software using OpenSSL includes OpenSSH, Postfix, Exim, Dovecot, OpenVPN, sshd, and appliance vendors such as Cisco Systems, Juniper Networks, and F5 Networks.
The bug was a buffer over-read in the TLS/DTLS heartbeat extension handling in OpenSSL, tracked as CVE-2014-0160. The heartbeat extension was specified by the Internet Engineering Task Force in RFCs associated with TLS. A malformed heartbeat request allowed an attacker to request up to 64 kilobytes of server memory per request, potentially returning fragments containing private key material, session cookies, usernames, passwords, or other secrets from memory regions used by applications such as Apache HTTP Server, nginx, and OpenSSH. The flaw affected multiple OpenSSL versions distributed by Debian, Ubuntu, Red Hat, SUSE, Gentoo, Oracle Linux distributions, and embedded products from Samsung and Huawei Technologies. Exploitation required network access to the TLS service endpoint, permitting remote actors associated with groups like advanced persistent threat actors, criminal syndicates, or state-sponsored teams to obtain confidential data without leaving conventional logs that would be detected by intrusion detection systems from vendors such as Snort and Suricata.
The bug was independently identified by researchers at the Google Security Team and by security firm Codenomicon during April 2014. Coordinated disclosure involved parties including the OpenSSL Software Foundation, the Linux Foundation, and security vendors such as Qualys and Akamai Technologies. Notification to affected distributors reached organizations including Debian, Red Hat, Ubuntu, Amazon Web Services, Microsoft, Apple Inc., and major hosting providers like GoDaddy, Rackspace, DigitalOcean, and OVH. The disclosure timeline prompted debate involving academics from Massachusetts Institute of Technology, Stanford University, University of California, Berkeley, and policy stakeholders including Electronic Frontier Foundation and Internet Society about responsible vulnerability disclosure practices and the funding of critical open source infrastructure.
The vulnerability had widespread operational and reputational consequences for internet infrastructure used by companies such as Google, Facebook, Twitter, Yahoo!, Amazon, LinkedIn, and Dropbox. Certificate authorities including DigiCert, Symantec, Comodo, and Let’s Encrypt advised revocation or reissuance of TLS certificates after private keys were replaced. Financial institutions like JPMorgan Chase, Bank of America, Wells Fargo, and payment processors such as Visa Inc. and Mastercard reviewed incident responses. National cybersecurity agencies including United States Computer Emergency Readiness Team, National Cyber Security Centre (United Kingdom), and Australian Cyber Security Centre issued advisories. The episode influenced policy discussions at United Nations forums and prompted academic studies published by researchers affiliated with Carnegie Mellon University and University of Oxford on systemic risks to critical open source projects.
Mitigation required updating OpenSSL to patched releases provided by the OpenSSL Software Foundation and applying vendor-specific packages distributed by Debian, Ubuntu, Red Hat, SUSE, CentOS, Oracle and others. Administrators were instructed to revoke and reissue TLS certificates with certificate authorities such as DigiCert and Comodo, rotate SSH keys where applicable, reset passwords for affected services hosted by providers like Google, Microsoft, Yahoo!, and Dropbox, and restart daemons such as Apache HTTP Server and nginx. Cloud providers including Amazon Web Services, Google Cloud Platform, Microsoft Azure, Heroku, and DigitalOcean rolled out emergency updates and posted remediation guides. Security tooling vendors including Qualys, Rapid7, and Tenable released scanners to detect vulnerable OpenSSL versions and helped organizations prioritize patching campaigns.
The incident prompted litigation and regulatory scrutiny involving entities like Federal Trade Commission inquiries and class action suits in jurisdictions including United States, Canada, and United Kingdom. Philanthropic and public funding responses targeted open source maintenance through initiatives by Mozilla Foundation, Linux Foundation, and grants coordinated by Ford Foundation and Fordham University programs supporting critical infrastructure. Ethical debates engaged think tanks such as RAND Corporation, Brookings Institution, and Center for Strategic and International Studies about liability for open source maintainers and disclosure norms advocated by Electronic Frontier Foundation and Open Rights Group. Economically, estimates by analysts at Gartner, Forrester Research, and McKinsey & Company assessed remediation costs borne by enterprises, insurance providers like AIG and Lloyd's of London reviewed cyber policy exposures, and venture and corporate donors reassessed investment in software supply chain security.
Category:Computer security vulnerabilities