Threat Update | Logjam Vulnerability

May 20, 2015

What is Logjam?

Logjam is a browser and website encryption vulnerability that allows attackers to view encrypted content by downgrading security connections.

How does this vulnerability work?

When websites and mail servers attempt to communicate security with end users many of them do what is known as a Diffie-Hellman key exchange in an attempt to establish an encrypted connection. The Logjam attack allows man-in-the-middle attackers to downgrade vulnerable TLS connections to 512-bit export-grade cryptography. This downgraded connection would make it possible for hackers to decrypt the traffic.

Herjavec Group has not seen reports of hackers leveraging this technique to date.

We recommend that HTTPS services utilize at minimum a 1024- bit key.
A patch has been released for Internet Explorer and more are forthcoming for other browsers. Please ensure your organization is using the latest version of your applicable browser. Herjavec Group will continue to monitor this vulnerability and notify our customers of appropriate developments.

A free SSL Qualys test can be leveraged to monitor susceptibility of a server or domain to the latest SSL vulnerabilities:
 
In addition, the following assessment can be completed focusing specifically on the Logjam vulnerability:

 

Stay Informed 

    Follow us on Twitter

    Connect with us on LinkedIn

*By selecting one of the communications above, you consent to Herjavec Group
sending commercial electronic messages to you for marketing purposes, including information about the products, services and events selected.


Take the First Step
In Transforming Your Cybersecurity Program

Enterprise security teams are adapting to meet evolving business needs. With 5 global Security Operations Centers, emerging technology partners and a dedicated team of security specialists, Herjavec Group is well-positioned to be your organization’s trusted advisor in cybersecurity. We’ll help you understand your risk exposure, increase your visibility and ROI, and proactively hunt for the latest threats.

Book a Free Consultation

Stay Informed

Follow us on Twitter
Connect with us on LinkedIn