{"id":1678,"date":"2025-04-22T20:27:09","date_gmt":"2025-04-22T20:27:09","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=1678"},"modified":"2025-04-22T20:27:09","modified_gmt":"2025-04-22T20:27:09","slug":"ssl-com-vulnerability-allowed-fraudulent-ssl-certificates-for-main-domains","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=1678","title":{"rendered":"SSL.com Vulnerability Allowed Fraudulent SSL Certificates for Main Domains"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"is-style-cnvs-paragraph-callout\">An SSL.com vulnerability allowed attackers to difficulty legitimate SSL certificates for main domains by exploiting a bug in its email-based area verification methodology.<\/p>\n<p>Web safety depends on belief, and the Certificates Authority (CA) is a key participant on this system because it verifies web site identities, and points <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/how-to-prevent-your-website-from-authentication-hacking-attack\/\" target=\"_blank\" data-type=\"post\" data-id=\"20973\" rel=\"noreferrer noopener\">SSL\/TLS certificates<\/a>, which encrypt communication between a pc and the web site. <\/p>\n<p>Nevertheless, not too long ago, a major problem was discovered with certainly one of these trusted CAs, SSL.com. Researchers found a flaw in how SSL.com was checking if somebody requesting a certificates truly managed the area title, a course of referred to as <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/docs.digicert.com\/en\/certcentral\/manage-certificates\/dv-certificate-enrollment\/domain-control-validation--dcv--methods.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Area Management Validation<\/a> (DCV).<\/p>\n<p>SSL.com permits customers to confirm area management and acquire a TLS certificates for encrypted HTTPS connections by making a <code>_validation-contactemail DNS TXT<\/code> report with the contact electronic mail handle as the worth. SSL.com sends a code and URL to substantiate the person\u2019s management of the area. Nevertheless, as a consequence of this bug, SSL.com now considers the person because the proprietor of the area used for the contact electronic mail.<\/p>\n<p>This flaw stems from the best way electronic mail is used to confirm management, significantly with MX information, which point out which servers obtain electronic mail for that area. It allowed anybody to obtain electronic mail at any electronic mail handle related to a site, doubtlessly acquiring a legitimate SSL certificates for the whole area. It&#8217;s particularly associated to the <code>BR 3.2.2.4.14 DCV<\/code> methodology aka \u2018E-mail to DNS TXT Contact\u2019.<\/p>\n<p>This can be a massive deal as a result of an attacker wouldn\u2019t must have full management over a web site e.g., google.com, to get a legitimate-looking certificates as simply the e-mail handle of an worker or perhaps a free electronic mail handle that\u2019s one way or the other linked to the area is sufficient.<\/p>\n<p>Malicious actors can use legitimate SSL certificates to create faux variations of official web sites, steal credentials, intercept person communication, and doubtlessly steal delicate data by way of a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/critical-openssh-flaws-expose-users-mitm-dos-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">man-in-the-middle<\/a> assault. A safety researcher utilizing the alias <em>Sec Reporter<\/em> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1961406\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">demonstrated<\/a> this through the use of an <code>@aliyun.com<\/code> electronic mail handle (a webmail service run by Alibaba) to get certificates for <code>aliyun.com<\/code> and <code>www.aliyun.com<\/code>. \u00a0<\/p>\n<p>This vulnerability impacts organizations with publicly accessible electronic mail addresses, significantly giant firms, domains with out strict electronic mail management, and domains utilizing CAA (Certification Authority Authorization) DNS information.<\/p>\n<p>SSL.com has acknowledged the difficulty and defined that moreover the take a look at certificates the researcher obtained, that they had mistakenly issued ten different certificates in the identical manner. These certificates, beginning as early as June 2024, had been for the next domains:<\/p>\n<p><code>*. medinet.ca<\/code>, <code>assist.gurusoft.com.sg<\/code> (issued twice), <code>banners.betvictor.com<\/code>, <code>production-boomi.3day.com<\/code>, <code>kisales.com<\/code> (issued 4 instances), and <code>medc.kisales.com<\/code> (issued 4 instances).<\/p>\n<p>The corporate additionally disabled the \u2018E-mail to DNS TXT Contact\u2019 validation methodology and clarified that \u201cthis didn&#8217;t have an effect on the programs and APIs utilized by Entrust.\u201d<\/p>\n<p>Regardless that SSL.com\u2019s difficulty has been resolved, it exhibits the vital steps to take care of web site security. CAA information ought to be used to inform browsers which firms can difficulty certificates, public logs ought to be monitored to catch unauthorised certificates, and electronic mail accounts linked to web sites ought to be safe.<\/p>\n<\/p><\/div>\n<p><template id="PTcRKVNkJUExda2vp6Es"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An SSL.com vulnerability allowed attackers to difficulty legitimate SSL certificates for main domains by exploiting a bug in its email-based area verification methodology. Web safety depends on belief, and the Certificates Authority (CA) is a key participant on this system because it verifies web site identities, and points SSL\/TLS certificates, which encrypt communication between a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1680,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1621,1129,1623,1622,967,931,1620,1061],"class_list":["post-1678","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-allowed","tag-certificates","tag-domains","tag-fraudulent","tag-major","tag-ssl","tag-ssl-com","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1678"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1678\/revisions"}],"predecessor-version":[{"id":1679,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1678\/revisions\/1679"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/1680"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-21 09:15:34 UTC -->