(DC) InCommon Certificate Chain Issue

(DC) InCommon Certificate Chain Issue

Description

The Information Security Office (ISO) recently sent out e-mail notifications regarding an "Awareness of Potential Threat" regarding “A known CA SSL certificate in the certificate chain has been signed using a weak hashing algorithm.” and included a recommendation to "contact the Certificate Authority to have the certificate reissued."

DO NOT request a new SSL certificate to address this specific issue. The CA SSL certificate in your application or service must be replaced to address this issue.

Email from the ISO (September 2024)

From: UT Information Security Office <security@utexas.edu> Sent: Tuesday, September 10, 2024 2:21 AM To: … Subject: UT/ISO -- Awareness of Potential Threat ============================================================ The following alert is the product of the Cyber Hunting Orchestrated Maneuvers Platform (C.H.O.M.P) service created by the UT Austin Information Security Office. This is an informational notice only. ============================================================ The Information Security Office has verified that the following systems are susceptible to a notable vulnerability or have a possibly unnecessary service exposed to the internet and we wanted to bring them to your attention. (SEE ATTACHED CSV FOR MORE DETAILS AND REMEDIATION INFORMATION) ------------------------------ Notes ------------------------------ This action aligns with the risk criteria laid out in the ISO's Vulnerability Management Program (https://security.utexas.edu/vmp ). You can view these results and others via our Managed Splunk Service: https://splunk.security.utexas.edu/en-US/app/mss_app/tenable_hosts We strongly recommend deploying Nessus Agents throughout your network, including on systems processing Confidential data, where it is required by policy: https://security.utexas.edu/nessus-agents If network isolation is needed to address this issue (e.g., host firewalls aren't possible) then the General Network must be leveraged. The General Network offers one of the most secure networks on campus with new security features being added frequently. Note, NAT is not considered isolation. If a port must be publicly exposed to inbound traffic from the internet an exception must be filed at https://isora.security.utexas.edu/r/compliance . Please let us know if you believe any of this information to be inaccurate so that we can be of better service in the future. Thank you for your vigilance. Information Security Office The University of Texas at Austin security@utexas.edu http://security.utexas.edu =======================================

Details about the vulnerability...

The remote service uses a known CA certificate in the SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g., MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks (CVE-2004-2761, for example). An attacker can exploit this to generate another certificate with the same digital signature, allowing the attacker to masquerade as the affected service.

Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm.

Note that this plugin will only fire on root certificates that are known certificate authorities as listed in Tenable Community Knowledge Article 000001752. That is what differentiates this plugin from plugin 35291, which will fire on any certificate, not just known certificate authority root certificates.

Known certificate authority root certificates are inherently trusted and so any potential issues with the signature, including it being signed using a weak hashing algorithm, are not considered security issues.

 

This article provides an explanation of the issue and how to resolve it.

Why am I receiving this email?

The enrollment emails that customer receive upon the generation or renewal of SSL certificates from the Digital Certificates service (aka InCommon certificates) include links to the following:

  • "AAA Certificate Services" root certificate

  • "USERTrust RSA Certification Authority" intermediate certificate

that are detailed in the diagram "Trust Chain Path B" found at the bottom the page Knowledge Base

The problem

Most customers dutifully use the information that is provided to them in this email and install the "AAA Certificate Services" root certificate as part of their certificate chain within their application or service. This action may result in an "Awareness of Potential Threat" email from the ISO regarding the use of SHA-1 certificates.

In the guidance from ISO, they recommend that you contact the Certificate Authority to have the certificate reissued. The certificate is one owned and supplied by our certificate authority and can not be reissued. Additionally reissuing the SSL certificate for you application or service will not resolve the issue.

The solution

To address the ISO notice, affected customers can migrate from "Trust Chain Path B" to "Trust Chain Path A" replacing their certificate chain with "USERTrust RSA Certification Authority" root certificate and the "InCommon RSA Server CA 2" Intermediate Certificate.

Please review all certificates in your certificate chain to correctly identify each one. You can use the site “certificate decoder” to determine what PEM encoded block is which certificate.

You need remove BOTH "AAA Certificate Services" root certificate and the "USERTrust RSA Certification Authority" intermediate certificate and replace them with the above certificates.


Please find the certificates for "Trust Chain Path A" in the following locations:

Please see the documentation for your particular application or service for instructions on how to replace the certificates.

 Technical Details for the various certificates

The "AAA Certificate Services" root certificate has the following thumbprints:

  • SHA-256: d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4

  • SHA-1: d1eb23a46d17d68fd92564c2f1f1601764d8e349

The "USERTrust RSA Certification Authority" intermediate certificate has the following thumbprints:

  • SHA-256: 68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b

  • SHA-1 d89e3bd43d5d909b47a18977aa9d5ce36cee184c

The "USERTrust RSA Certification Authority" root certificate has the following thumbprints:

  • SHA-256: e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2

  • SHA-1: 2b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e