Skip to content

DROWN Attack Compromises SSL/TLS Sessions, Partner Servers Secured

The DROWN attack has raised serious concerns about SSL/TLS security. While the partner company remains unidentified, swift action has been taken to secure vulnerable servers and protect user data.

In this image there is a seal in the water.
In this image there is a seal in the water.

DROWN Attack Compromises SSL/TLS Sessions, Partner Servers Secured

A serious security vulnerability, known as DROWN, has been exploited, potentially compromising SSL/TLS sessions. The attack, which took place on March 1, targeted three servers, although the partner company involved remains unidentified.

The DROWN vulnerability in OpenSSL was publicly disclosed on March 1, prompting immediate action. Internal scans on March 2 revealed that three servers were susceptible to the March madness. These servers, part of a decommissioning partner-facing application, were quickly secured by turning off access to the respective services. Queries about the servers' vulnerability were received on March 3. Despite no DNS names being connected to the servers, their IP addresses remained accessible. The certificate served on these machines is being reissued with a new private key to mitigate further risks. Successful exploitation of DROWN can lead to decryption of SSL/TLS sessions, highlighting the severity of the issue.

The DROWN attack on March 1 has raised significant concerns about the security of SSL/TLS sessions. While the partner company involved has not been identified, the vulnerable servers have been secured, and the certificate reissued. Further investigation is underway to ensure the safety of users' data.

Read also:

Latest