Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » DigiCert is revoking over 83,000 SSL certificates due to a domain validation violation
Global Security

DigiCert is revoking over 83,000 SSL certificates due to a domain validation violation

AdminBy AdminJuly 31, 2024No Comments3 Mins Read
DigiCert
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 31, 2024Ravi LakshmananWeb Security / Compliance

DigiCert

Certification authority (CA) DigiCert has warned that it will revoke a subset of SSL/TLS certificates within 24 hours due to an oversight in how it verifies that a digital certificate is issued to a legitimate domain owner.

The company said it will revoke certificates that do not have proper domain control checks (CVD).

“Before issuing a certificate to a customer, DigiCert verifies the customer’s control or ownership of the domain name for which it is requesting a certificate using one of several methods approved by the CA/Browser Forum (CABF),” this said.

One way this is done depends on the client setting a DNS CNAME record which contains a random value provided to it by DigiCert, which then performs a DNS lookup on the corresponding domain to ensure that the random values ​​match.

Cyber ​​security

The random value for DigiCert is prefixed with an underscore character to prevent a possible collision with an actual subdomain that uses the same random value.

The Utah-based company discovered that it failed to include an underscore prefix with a random value used in some CNAME-based validation cases.

The problem stems from a series of changes introduced in 2019 to modernize the core architecture, in which the code that adds the underscore prefix was removed and subsequently “added to some paths in the updated system”, but not to a single path that added it automatically and didn’t check if the previously added underscore had a random value.

“The lack of an automatic underscore prefix was not discovered during cross-functional team reviews that occurred prior to the deployment of the updated system,” DigiCert said.

“Although we had regression testing, these tests did not alert us to a change in functionality because the regression tests covered workflows and functionality, not random value content/structure.”

“Unfortunately, no reviews have been done to compare the old implementations of random values ​​with the implementations of random values ​​in the new system for each scenario. If we had performed these evaluations, we would have known earlier that the system does not automatically prefix the underscore to the random value where necessary.”

Later on June 11, 2024, DigiCert stated that it had re-engineered the random value generation process and eliminated the manual addition of the underscore prefix as part of a user experience improvement project, but admitted that it was again unable to “compare this UX change to the underscore flow in the legacy system.” .

The company said it didn’t discover the problem with the discrepancy until “several weeks ago” when an unnamed customer reached out about the random values ​​used in the validation, prompting a deeper review.

He also noted that the incident affects about 0.4% of eligible domain checks, which according to an update in the corresponding Bugzilla report, affects 83,267 certificates and 6,807 clients.

Notified customers are encouraged to replace their certificates as soon as possible by logging into their DigiCert accounts, creating a Certificate Signing Request (CSR) and reissuing them after passing DCV.

The event prompted the US Cybersecurity and Infrastructure Security Agency (CISA) to issue a warning that stating that “revocation of these certificates may cause temporary disruptions to websites, services, and applications that rely on these certificates for secure communication.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.