Researchers disclosed a new SSL/TLS vulnerability — the FREAK attack. The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use ‘export-grade’ cryptography, which can then be decrypted or altered.

A connection is vulnerable if the server accepts RSA_EXPORT cipher suites and the client either offers an RSA_EXPORT suite or is using a version of OpenSSL that is vulnerable to CVE-2015-0204. Vulnerable clients include many Google and Apple devices (which use unpatched OpenSSL), a large number of embedded systems, and many other software products that use TLS behind the scenes without disabling the vulnerable cryptographic suites.

Top 20 vulnerable sites based on Alexa rank:

27,sohu.com,123.125.116.19
182,businessinsider.com,64.27.101.155
234,ppomppu.co.kr,110.45.151.212
243,smzdm.com,114.113.158.226
247,americanexpress.com,23.13.171.41
251,jabong.com,23.203.7.176
273,groupon.com,184.26.49.170
290,bloomberg.com,69.191.212.191
442,4shared.com,208.88.224.136
448,npr.org,216.35.221.76
519,hatena.ne.jp,59.106.194.19
615,instructables.com,74.50.63.27
629,airtel.in,125.19.135.93
649,kohls.com,23.202.240.45
767,adplxmd.com,205.186.187.178
795,mit.edu,23.202.254.127
799,tinyurl.com,23.220.249.147
808,suning.com,122.228.85.93
820,saramin.co.kr,182.162.86.29
891,vi-view.com,50.97.32.135

Test your browser (client) for SSL FREAK vulnerability

How to check your server for SSL FREAK vulnerability

Open a terminal and type:

openssl s_client -connect www.google.com:443 -cipher EXPORT

Replace www.google.com with your hostname.

Safe output:

CONNECTED(00000003)
140014904252064:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:s23_clnt.c:770:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 111 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE

Vulnerable output:

CONNECTED(00000003)
depth=2 C = US, O = "VeriSign, Inc.", OU = VeriSign Trust Network, OU = "(c) 2006 VeriSign, Inc. - For authorized use only", CN = VeriSign Class 3 Public Primary Certification Authority - G5
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
.......
Server certificate
-----BEGIN CERTIFICATE-----
......
-----END CERTIFICATE-----
SSL handshake has read 5417 bytes and written 245 bytes
---
New, TLSv1/SSLv3, Cipher is EXP-DES-CBC-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE

How To Test a Server for SSL FREAK Vulnerability
Tagged on: