Microsoft updates trust list after private key for Xbox Live leaks

Private key for * disclosed

On Tuesday, Microsoft updated their Certificate Trust List (CTL) after the private key for was leaked to the Web. The company didn't explain how the leak happened, but the exposed certificates were immediately revoked and replaced.

"Microsoft is aware of an SSL/TLS digital certificate for * for which the private keys were inadvertently disclosed. The certificate could be used in attempts to perform man-in-the-middle attacks," the software giant explained in their advisory.

"To help protect customers from potentially fraudulent use of the SSL/TLS digital certificate, the certificate has been deemed no longer valid and Microsoft is updating the Certificate Trust list (CTL) for all supported releases of Microsoft Windows to remove the trust of the certificate."

The newly updated CTL will be pushed to all supported versions of Windows.

Tod Beardsley, Security Research Manager at Rapid7, called the accidental disclosure cryptographic hygiene miss, "but on the whole, users are unlikely to be adversely affected, provided they update their local Certificate Trust List in the usual way."

"It's possible that private information such as passwords and payment information was exposed during the time the private key was both known and the public certificates haven't been changed, but for most people, this would appear unlikely," Beardsley added.

The reason it's unlikely, Beardsley said, is because an attacker would need to have been aware of the private key and at least recording SSL sessions via a man-in-the-middle.

"This scenario would require the attacker to be somewhere along the path between the victim and Microsoft's servers," he said.

For customers running versions of Windows on mobile devices (Windows Phone 8 and 8.1, Windows 10 Mobile); desktop (Windows 8, 8.1, RT, RT 8.1, Windows 10); and server (Server 2012, Server 2012 R2) the CTL will be updated automatically via the CTL updater.

Systems running Vista, Windows 7, Windows Server 2008, or Windows Server 2008 R2 will need to make sure they've installed the CTL updater service (KB 2677070).

While the compromised keys could've been used to perform man-in-the-middle attacks prior to them being revoked, it's important to note they couldn't be used to issue other certificates, impersonate other domains, or sign code, Microsoft says.

"The troubling part is that Microsoft was aware of the key disclosure for at least a week," Beardsley said, noting the advisory stated the certificate has been disallowed since December 1.

"As unlikely as an active or passive man-in-the-middle attack is, it's even less likely the private key happened to be disclosed on a regularly scheduled Patch Tuesday. I understand that incident response cannot be instantaneous, but hope that in the future the company is able to move faster on reissuing certificates when they are known to be compromised."

In related news, Microsoft released 12 security bulletins on Tuesday, nine of them rated critical, which resolve 71 vulnerabilities.

One of the more standout vulnerabilities is MS15-127, which fixes a flaw that could allow remote code execution if an attacker sends a specially crafted request to a DNS server.

The flaw is given an exploitability rank of 2 by Microsoft, meaning exploitation less likely, but they don't offer many details on the flaw itself other than to state that it's triggered by DNS requests. For organizations running a Microsoft DNS server exposed to the public, it might be worth including this patch alongside the other priority fixes this month – just to stay safe.

Rapid7's Adam Nowak also suggested MS15-124, MS15-125 and MS15-128 as bulletins to watch out for, as they address 33 vulnerabilities on their own.

"Since a wide range of products are affected this month almost all Microsoft users should be on alert. Microsoft's update addresses the vulnerabilities by resolving underlying issues with how certain functions in VBScript handle objects in memory, preventing cross site scripting (XSS) from incorrectly disabled HTML attributes, proper enforcement of content types and cross-domain policies," Nowak said.

Other patches released on Tuesday include fixes for more than 70 vulnerabilities from Adobe, and more than 50 from Apple on iOS, Safari, and Watch OS.

Join the CSO newsletter!

Error: Please check your email address.

More about AppleMicrosoftRapid7

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Steve Ragan

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts