Microsoft Security Bulletin MS15-031 - Important (2024)

  • Article

Vulnerability in Schannel Could Allow Security Feature Bypass (3046049)

Published: March 10, 2015 | Updated: March 24, 2015

Version: 1.1

Executive Summary

This security update resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected.

This security update is rated Important for all supported releases of Microsoft Windows. For more information, see the Affected Software section.

The security update addresses the vulnerability by correcting the cipher suite enforcement policies that are used when server keys are exchanged between servers and client systems. For more information about the vulnerability, see the Vulnerability Information section.

This security update also addresses the vulnerability first described in Microsoft Security Advisory 3046015.

For more information about this update, see Microsoft Knowledge Base Article 3046049.

Affected Software

The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.

Operating SystemMaximum Security ImpactAggregate Severity RatingUpdates Replaced
Windows Server 2003
Windows Server 2003 Service Pack 2 (3046049)Security Feature BypassImportant2992611 in MS14-066
Windows Server 2003 x64 Edition Service Pack 2 (3046049)Security Feature BypassImportant2992611 in MS14-066
Windows Server 2003 with SP2 for Itanium-based Systems (3046049)Security Feature BypassImportant2992611 in MS14-066
Windows Vista
Windows Vista Service Pack 2 (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Vista x64 Edition Service Pack 2 (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Server 2008
Windows Server 2008 for 32-bit Systems Service Pack 2 (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Server 2008 for x64-based Systems Service Pack 2 (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Server 2008 for Itanium-based Systems Service Pack 2 (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows 7
Windows 7 for 32-bit Systems Service Pack 1 (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows 7 for x64-based Systems Service Pack 1 (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Server 2008 R2
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows 8 and Windows 8.1
Windows 8 for 32-bit Systems (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows 8 for x64-based Systems (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows 8.1 for 32-bit Systems (3046049)Security Feature BypassImportantNone
Windows 8.1 for x64-based Systems (3046049)Security Feature BypassImportantNone
Windows Server 2012 and Windows Server 2012 R2
Windows Server 2012 (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Server 2012 R2 (3046049)Security Feature BypassImportantNone
Windows RT and Windows RT 8.1
Windows RT[1](3046049)Security Feature BypassImportant3023562 in MS15-010
Windows RT 8.1[1](3046049)Security Feature BypassImportantNone
Server Core installation option
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Server 2012 (Server Core installation) (3046049)Security Feature BypassImportant3023562 in MS15-010
Windows Server 2012 R2 (Server Core installation) (3046049)Security Feature BypassImportantNone

NoteThe update is available for Windows Technical Preview and Windows Server Technical Preview. Customers running these operating systems are encouraged to apply the update, which is available via Windows Update.

[1]This update is available via Windows Update only.

Update FAQ

After installing the update, EXPORT ciphers are still enabled on Windows Server 2003; how do I disable them?
To disable the EXPORT ciphers on Windows Server 2003 systems, follow the guidance provided in Microsoft Knowledge Base Article 3050509.

Severity Ratings and Vulnerability Identifiers

The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the March bulletin summary.

Vulnerability Severity Rating and Maximum Security Impact by Affected Software
Affected SoftwareSchannel Security Feature Bypass Vulnerability - CVE-2015-1637Aggregate Severity Rating
Windows Server 2003
Windows Server 2003 Service Pack 2 (3046049)Important Security Feature BypassImportant
Windows Server 2003 x64 Edition Service Pack 2 (3046049)Important Security Feature BypassImportant
Windows Server 2003 with SP2 for Itanium-based Systems (3046049)Important Security Feature BypassImportant
Windows Vista
Windows Vista Service Pack 2 (3046049)Important Security Feature BypassImportant
Windows Vista x64 Edition Service Pack 2 (3046049)Important Security Feature BypassImportant
Windows Server 2008
Windows Server 2008 for 32-bit Systems Service Pack 2 (3046049)Important Security Feature BypassImportant
Windows Server 2008 for x64-based Systems Service Pack 2 (3046049)Important Security Feature BypassImportant
Windows Server 2008 for Itanium-based Systems Service Pack 2 (3046049)Important Security Feature BypassImportant
Windows 7
Windows 7 for 32-bit Systems Service Pack 1 (3046049)Important Security Feature BypassImportant
Windows 7 for x64-based Systems Service Pack 1 (3046049)Important Security Feature BypassImportant
Windows Server 2008 R2
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (3046049)Important Security Feature BypassImportant
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 (3046049)Important Security Feature BypassImportant
Windows 8 and Windows 8.1
Windows 8 for 32-bit Systems (3046049)Important Security Feature BypassImportant
Windows 8 for x64-based Systems (3046049)Important Security Feature BypassImportant
Windows 8.1 for 32-bit Systems (3046049)Important Security Feature BypassImportant
Windows 8.1 for x64-based Systems (3046049)Important Security Feature BypassImportant
Windows Server 2012 and Windows Server 2012 R2
Windows Server 2012 (3046049)Important Security Feature BypassImportant
Windows Server 2012 R2 (3046049)Important Security Feature BypassImportant
Windows RT and Windows RT 8.1
Windows RT (3046049)Important Security Feature BypassImportant
Windows RT 8.1 (3046049)Important Security Feature BypassImportant
Server Core installation option
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (3046049)Important Security Feature BypassImportant
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (3046049)Important Security Feature BypassImportant
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (3046049)Important Security Feature BypassImportant
Windows Server 2012 (Server Core installation) (3046049)Important Security Feature BypassImportant
Windows Server 2012 R2 (Server Core installation) (3046049)Important Security Feature BypassImportant

Vulnerability Information

Schannel Security Feature Bypass Vulnerability - CVE-2015-1637

A security feature bypass vulnerability exists in Secure Channel (Schannel) that is caused by an issue in the TLS state machine whereby a client system accepts an RSA key with a shorter key length than the originally negotiated key length. The vulnerability facilitates exploitation of the publicly disclosed FREAK technique, which is an industry-wide issue that is not specific to Windows operating systems.

In a man-in-the-middle (MiTM) attack, an attacker could downgrade the key length of an RSA key to EXPORT-grade length in an encrypted TLS session. The attacker could then intercept and decrypt this traffic. Any Windows system connecting to a TLS server as a client is affected. An attacker who successfully exploited this vulnerability could perform MiTM attacks that could decrypt encrypted traffic.

The security update addresses the vulnerability by correcting the cipher suite enforcement policies that are used when server keys are exchanged between servers and client systems.

This vulnerability has been publicly disclosed. It has been assigned Common Vulnerability and Exposure number CVE-2015-1637. When this bulletin was originally released, Microsoft had not received any information to indicate that this issue had been publicly used to attack customers.

Mitigating Factors

The following mitigating factors may be helpful in your situation:

  • A server needs to support RSA key exchange EXPORT ciphers for an attack to be successful; the ciphers are disabled in default configurations of Windows Vista/Server 2008 and later operating systems.

Workarounds

The following workarounds may be helpful in your situation:

  • Disable RSA key exchange ciphers using the Group Policy Object Editor (Windows Vista and later systems only)
    You can disable the RSA key exchange ciphers in Windows Vista and later systems by modifying the SSL Cipher Suite order in the Group Policy Object Editor.

    NoteInstalling this update (3046049) protects systems from the vulnerability discussed in this bulletin. Customers who have previously implemented this workaround will need to follow the steps for undoing the workaround if they want to use any of the ciphers that were previously disabled.

    To disable the RSA key exchange ciphers you have to specify the ciphers that Windows should use by performing the following steps:

    1. At a command prompt, type gpedit.msc and press Enter to start the Group Policy Object Editor.

    2. Expand Computer Configuration, Administrative Templates, Network, and then click SSL Configuration Settings.

    3. Under SSL Configuration Settings, double-click SSL Cipher Suite Order.

    4. In the SSL Cipher Suite Order window, click Enabled.

    5. In the Options: pane, double-click to highlight the entire contents of the SSL Cipher Suites field and then replace its contents with the following cipher list:

      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA`
    6. Click OK

    7. Close the Group Policy Object Editor and then restart your system.

    Impact of workaround.Windows will fail to connect to systems that do not support any of the ciphers listed in the workaround. To determine which ciphers are available for each cryptographic protocol refer to Cipher Suites in Schannel.

How to undo the workaround.Follow these steps to disable the SSL Cipher Suite Order policy setting:

  1. At a command prompt, type gpedit.msc and press Enter to start the Group Policy Object Editor.
  2. Expand Computer Configuration, Administrative Templates, Network, and then click SSL Configuration Settings.
  3. Under SSL Configuration Settings, double-click SSL Cipher Suite Order.
  4. In the SSL Cipher Suite Order window, click Disabled and then click OK.
  5. Close the Group Policy Object Editor and then restart your system.

Security Update Deployment

For Security Update Deployment information, see the Microsoft Knowledge Base article referenced in the Executive Summary.

Acknowledgments

Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. See Acknowledgments for more information.

Disclaimer

The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Revisions

  • V1.0 (March 10, 2015): Bulletin published.
  • V1.1 (March 24, 2015): Revised bulletin to add an FAQ directing customers to Microsoft Knowledge Base Article 3050509 for instructions on how to disable EXPORT ciphers after installing the update on Windows Server 2003 systems.

Page generated 2015-03-23 16:56Z-07:00.

Microsoft Security Bulletin MS15-031 - Important (2024)

FAQs

How do I disable RSA key exchange ciphers? ›

Disable RSA ciphers
  1. Open $IMPACT_HOME/sdk/jre/lib/security/java. security in a text editor.
  2. Locate the jdk.tls.disabledAlgorithms property. It should have some existing entries. ...
  3. Add each cipher you want to disable, separated by a comma. ...
  4. Save the changes to java. ...
  5. Restart the Impact server.

What is a severity rating for Microsoft? ›

Microsoft Vulnerability Severity Classification for Online Services
Data ClassificationSeverity
Highly ConfidentialCritical
ConfidentialImportant
GeneralModerate
PublicLow
36 more rows

What is the CVE number of the exploit reported in Microsoft Security Bulletin MS08 067? ›

CVE-2008-4250

How do I remove RSA token from Windows? ›

Delete a Token
  1. In the Security Console, click Authentication > SecurID Tokens > Manage Existing.
  2. Click the Assigned or Unassigned tab, depending on whether the tokens you want to delete are assigned to a user or are unassigned.
  3. Use the search fields to find the token that you want to delete.

How do I get rid of weak ciphers? ›

Solution
  1. Log in to the instance using the ssh command.
  2. Switch to a root user using the sudo su - command.
  3. List the currently enabled ciphers by running the command sshd -T | grep -i 'cipher'.
  4. Copy the list and remove the unwanted ciphers. ...
  5. Make a backup of the file /etc/ssh/sshd_config by running the command:

What is a good Microsoft score? ›

However, this can be a daunting task, especially for those lacking expertise in cybersecurity. Setting up robust security systems at a business level demands extensive knowledge. It's worth noting that according to Microsoft Standards, having a Security Score of 80% or higher is also considered sufficiently secure.

What is a good score for Microsoft secure score? ›

Although having an 80% Security Score or above is also considered secure enough based on Microsoft Standards. Having a 60% Security Score and below means you're vulnerable to security threats and need to implement industry-standard security practices to prevent hackers from getting their hands on your data.

What is Microsoft security score? ›

Microsoft Secure Score is a measurement of an organization's security posture, with a higher number indicating more recommended actions taken. It can be found at Microsoft Secure Score in the Microsoft Defender portal. Following the Secure Score recommendations can protect your organization from threats.

Why is MS08-067 bad? ›

It is sent to the Windows Server service, allowing attackers to execute code and take control of the affected system. Several types of malware were developed to exploit the MS08. 067 vulnerability, including the Conficker worm, which infected millions of computers worldwide.

What was the issue with ms07 029? ›

This is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could remotely take complete control of an affected system.

What is zero day malware? ›

A zero-day exploit is a cyberattack vector that takes advantage of an unknown or unaddressed security flaw in computer software, hardware or firmware. "Zero day" refers to the fact that the software or device vendor has zero days to fix the flaw because malicious actors can already use it to access vulnerable systems.

How do I disable ciphers in Windows? ›

Disable RC4/DES/3DES cipher suites in Windows using registry, Group Policy Object (GPO), or local security settings. You can do this using GPO or Local security policy under Computer configuration > Administrative Templates > Network > SSL Configuration Settings > SSL Cipher Suite Order.

How do I disable ciphers in registry? ›

Procedure
  1. Open the Registry Editor (Start > Run > regedit).
  2. In the HKEY_LOCAL_MAC HINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers directory: ...
  3. In the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Hashes directory: ...
  4. Close the Registry Editor.

What is RSA key exchange? ›

RSA Algorithm is used to perform public-key cryptography. In the RSA Algorithm, the sender encrypts the sender (Bob) encrypts the data to be transferred using his/her public key, and the receiver (Alice) decrypts the encrypted data using his/her private key.

How do I enable disable cipher suites? ›

Disabling Weak Cipher Suites Globally Through Java
  1. At a command prompt, access the java.security file: ...
  2. Open the java.security file and locate the following parameter: ...
  3. In this line, after =SSLv3 , add DES and DESede so that the line looks like this: ...
  4. Verify that weak cipher suites have been disabled.

Top Articles
2FA & MFA: The Good, The Bad & The Ugly
Safety And Policy Center
Fan Van Ari Alectra
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Vaya Timeclock
Wannaseemypixels
United Dual Complete Providers
biBERK Business Insurance Provides Essential Insights on Liquor Store Risk Management and Insurance Considerations
12 Best Craigslist Apps for Android and iOS (2024)
Hmr Properties
Nier Automata Chapter Select Unlock
Classroom 6x: A Game Changer In The Educational Landscape
History of Osceola County
Free Online Games on CrazyGames | Play Now!
How pharmacies can help
Gia_Divine
Costco Great Oaks Gas Price
Palm Springs Ca Craigslist
Why Should We Hire You? - Professional Answers for 2024
Glover Park Community Garden
Form F-1 - Registration statement for certain foreign private issuers
Shadbase Get Out Of Jail
25 Best Things to Do in Palermo, Sicily (Italy)
6 Most Trusted Pheromone perfumes of 2024 for Winning Over Women
Hannah Palmer Listal
4 Methods to Fix “Vortex Mods Cannot Be Deployed” Issue - MiniTool Partition Wizard
Great ATV Riding Tips for Beginners
San Jac Email Log In
Bi State Schedule
R/Orangetheory
Ultra Clear Epoxy Instructions
Domino's Delivery Pizza
Omnistorm Necro Diablo 4
Grapes And Hops Festival Jamestown Ny
Petsmart Northridge Photos
Has any non-Muslim here who read the Quran and unironically ENJOYED it?
Nba Props Covers
Stewartville Star Obituaries
Lbl A-Z
Actor and beloved baritone James Earl Jones dies at 93
Windshield Repair & Auto Glass Replacement in Texas| Safelite
Saline Inmate Roster
'The Nun II' Ending Explained: Does the Immortal Valak Die This Time?
Dontrell Nelson - 2016 - Football - University of Memphis Athletics
Euro area international trade in goods surplus €21.2 bn
Enjoy Piggie Pie Crossword Clue
Gummy Bear Hoco Proposal
Where Is Darla-Jean Stanton Now
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6556

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.