Microsoft Security Bulletin MS15-031 - Important
Vulnerability in Schannel Could Allow Security Feature Bypass (3046049)
Published: March 10, 2015 | Updated: March 24, 2015
Version: 1.1
Executive Summary
This security update resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected.
This security update is rated Important for all supported releases of Microsoft Windows. For more information, see the Affected Software section.
The security update addresses the vulnerability by correcting the cipher suite enforcement policies that are used when server keys are exchanged between servers and client systems. For more information about the vulnerability, see the Vulnerability Information section.
This security update also addresses the vulnerability first described in Microsoft Security Advisory 3046015.
For more information about this update, see Microsoft Knowledge Base Article 3046049.
Affected Software
The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.
Operating System | Maximum Security Impact | Aggregate Severity Rating | Updates Replaced |
---|---|---|---|
Windows Server 2003 | |||
Windows Server 2003 Service Pack 2 (3046049) | Security Feature Bypass | Important | 2992611 in MS14-066 |
Windows Server 2003 x64 Edition Service Pack 2 (3046049) | Security Feature Bypass | Important | 2992611 in MS14-066 |
Windows Server 2003 with SP2 for Itanium-based Systems (3046049) | Security Feature Bypass | Important | 2992611 in MS14-066 |
Windows Vista | |||
Windows Vista Service Pack 2 (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Vista x64 Edition Service Pack 2 (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Server 2008 | |||
Windows Server 2008 for 32-bit Systems Service Pack 2 (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Server 2008 for x64-based Systems Service Pack 2 (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Server 2008 for Itanium-based Systems Service Pack 2 (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows 7 | |||
Windows 7 for 32-bit Systems Service Pack 1 (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows 7 for x64-based Systems Service Pack 1 (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Server 2008 R2 | |||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows 8 and Windows 8.1 | |||
Windows 8 for 32-bit Systems (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows 8 for x64-based Systems (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows 8.1 for 32-bit Systems (3046049) | Security Feature Bypass | Important | None |
Windows 8.1 for x64-based Systems (3046049) | Security Feature Bypass | Important | None |
Windows Server 2012 and Windows Server 2012 R2 | |||
Windows Server 2012 (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Server 2012 R2 (3046049) | Security Feature Bypass | Important | None |
Windows RT and Windows RT 8.1 | |||
Windows RT[1](3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows RT 8.1[1](3046049) | Security Feature Bypass | Important | None |
Server Core installation option | |||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Server 2012 (Server Core installation) (3046049) | Security Feature Bypass | Important | 3023562 in MS15-010 |
Windows Server 2012 R2 (Server Core installation) (3046049) | Security Feature Bypass | Important | None |
Note The update is available for Windows Technical Preview and Windows Server Technical Preview. Customers running these operating systems are encouraged to apply the update, which is available via Windows Update.
[1]This update is available via Windows Update only.
Update FAQ
After installing the update, EXPORT ciphers are still enabled on Windows Server 2003; how do I disable them?
To disable the EXPORT ciphers on Windows Server 2003 systems, follow the guidance provided in Microsoft Knowledge Base Article 3050509.
Severity Ratings and Vulnerability Identifiers
The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the March bulletin summary.
Vulnerability Severity Rating and Maximum Security Impact by Affected Software | ||
---|---|---|
Affected Software | Schannel Security Feature Bypass Vulnerability - CVE-2015-1637 | Aggregate Severity Rating |
Windows Server 2003 | ||
Windows Server 2003 Service Pack 2 (3046049) | Important Security Feature Bypass | Important |
Windows Server 2003 x64 Edition Service Pack 2 (3046049) | Important Security Feature Bypass | Important |
Windows Server 2003 with SP2 for Itanium-based Systems (3046049) | Important Security Feature Bypass | Important |
Windows Vista | ||
Windows Vista Service Pack 2 (3046049) | Important Security Feature Bypass | Important |
Windows Vista x64 Edition Service Pack 2 (3046049) | Important Security Feature Bypass | Important |
Windows Server 2008 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (3046049) | Important Security Feature Bypass | Important |
Windows Server 2008 for x64-based Systems Service Pack 2 (3046049) | Important Security Feature Bypass | Important |
Windows Server 2008 for Itanium-based Systems Service Pack 2 (3046049) | Important Security Feature Bypass | Important |
Windows 7 | ||
Windows 7 for 32-bit Systems Service Pack 1 (3046049) | Important Security Feature Bypass | Important |
Windows 7 for x64-based Systems Service Pack 1 (3046049) | Important Security Feature Bypass | Important |
Windows Server 2008 R2 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (3046049) | Important Security Feature Bypass | Important |
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 (3046049) | Important Security Feature Bypass | Important |
Windows 8 and Windows 8.1 | ||
Windows 8 for 32-bit Systems (3046049) | Important Security Feature Bypass | Important |
Windows 8 for x64-based Systems (3046049) | Important Security Feature Bypass | Important |
Windows 8.1 for 32-bit Systems (3046049) | Important Security Feature Bypass | Important |
Windows 8.1 for x64-based Systems (3046049) | Important Security Feature Bypass | Important |
Windows Server 2012 and Windows Server 2012 R2 | ||
Windows Server 2012 (3046049) | Important Security Feature Bypass | Important |
Windows Server 2012 R2 (3046049) | Important Security Feature Bypass | Important |
Windows RT and Windows RT 8.1 | ||
Windows RT (3046049) | Important Security Feature Bypass | Important |
Windows RT 8.1 (3046049) | Important Security Feature Bypass | Important |
Server Core installation option | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (3046049) | Important Security Feature Bypass | Important |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (3046049) | Important Security Feature Bypass | Important |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (3046049) | Important Security Feature Bypass | Important |
Windows Server 2012 (Server Core installation) (3046049) | Important Security Feature Bypass | Important |
Windows Server 2012 R2 (Server Core installation) (3046049) | Important Security Feature Bypass | Important |
Vulnerability Information
Schannel Security Feature Bypass Vulnerability - CVE-2015-1637
A security feature bypass vulnerability exists in Secure Channel (Schannel) that is caused by an issue in the TLS state machine whereby a client system accepts an RSA key with a shorter key length than the originally negotiated key length. The vulnerability facilitates exploitation of the publicly disclosed FREAK technique, which is an industry-wide issue that is not specific to Windows operating systems.
In a man-in-the-middle (MiTM) attack, an attacker could downgrade the key length of an RSA key to EXPORT-grade length in an encrypted TLS session. The attacker could then intercept and decrypt this traffic. Any Windows system connecting to a TLS server as a client is affected. An attacker who successfully exploited this vulnerability could perform MiTM attacks that could decrypt encrypted traffic.
The security update addresses the vulnerability by correcting the cipher suite enforcement policies that are used when server keys are exchanged between servers and client systems.
This vulnerability has been publicly disclosed. It has been assigned Common Vulnerability and Exposure number CVE-2015-1637. When this bulletin was originally released, Microsoft had not received any information to indicate that this issue had been publicly used to attack customers.
Mitigating Factors
The following mitigating factors may be helpful in your situation:
- A server needs to support RSA key exchange EXPORT ciphers for an attack to be successful; the ciphers are disabled in default configurations of Windows Vista/Server 2008 and later operating systems.
Workarounds
The following workarounds may be helpful in your situation:
Disable RSA key exchange ciphers using the Group Policy Object Editor (Windows Vista and later systems only)
You can disable the RSA key exchange ciphers in Windows Vista and later systems by modifying the SSL Cipher Suite order in the Group Policy Object Editor.Note Installing this update (3046049) protects systems from the vulnerability discussed in this bulletin. Customers who have previously implemented this workaround will need to follow the steps for undoing the workaround if they want to use any of the ciphers that were previously disabled.
To disable the RSA key exchange ciphers you have to specify the ciphers that Windows should use by performing the following steps:
At a command prompt, type gpedit.msc and press Enter to start the Group Policy Object Editor.
Expand Computer Configuration, Administrative Templates, Network, and then click SSL Configuration Settings.
Under SSL Configuration Settings, double-click SSL Cipher Suite Order.
In the SSL Cipher Suite Order window, click Enabled.
In the Options: pane, double-click to highlight the entire contents of the SSL Cipher Suites field and then replace its contents with the following cipher list:
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA`
Click OK
Close the Group Policy Object Editor and then restart your system.
Impact of workaround. Windows will fail to connect to systems that do not support any of the ciphers listed in the workaround. To determine which ciphers are available for each cryptographic protocol refer to Cipher Suites in Schannel.
How to undo the workaround. Follow these steps to disable the SSL Cipher Suite Order policy setting:
- At a command prompt, type gpedit.msc and press Enter to start the Group Policy Object Editor.
- Expand Computer Configuration, Administrative Templates, Network, and then click SSL Configuration Settings.
- Under SSL Configuration Settings, double-click SSL Cipher Suite Order.
- In the SSL Cipher Suite Order window, click Disabled and then click OK.
- Close the Group Policy Object Editor and then restart your system.
Security Update Deployment
For Security Update Deployment information, see the Microsoft Knowledge Base article referenced in the Executive Summary.
Acknowledgments
Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. See Acknowledgments for more information.
Disclaimer
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Revisions
- V1.0 (March 10, 2015): Bulletin published.
- V1.1 (March 24, 2015): Revised bulletin to add an FAQ directing customers to Microsoft Knowledge Base Article 3050509 for instructions on how to disable EXPORT ciphers after installing the update on Windows Server 2003 systems.
Page generated 2015-03-23 16:56Z-07:00.