Facebook, PayPal and Other Prominent Sites Affected by the “the ROBOT Attack”
December 13, 2017

ROBOT was based on the flaw found by Bleichenbacher in 1998, which allowed the use of brute force attacks to successfully guess a session key and decrypt the HTTPS messages between TLS (HTTPS) servers and the client browser. This could happen if the session key was encrypted with the RSA algorithm and used the PKCS #1 1.5 padding system. The attacker could send session keys to the TLS server and inquire if it was valid—the server would answer ‘yes’ or ‘no’ until the attacker acquired the session key. Despite this flaw being around for almost two decades, ROBOT can still be leveraged today because the flaw’s countermeasures are complicated and not properly implemented.
According to the researchers, “for hosts that are vulnerable and only support RSA encryption key exchanges it's pretty bad. It means an attacker can passively record traffic and later decrypt it. For hosts that usually use forward secrecy, but still support a vulnerable RSA encryption key exchange the risk depends on how fast an attacker is able to perform the attack. We believe that a server impersonation or man in the middle attack is possible [sic], but it is more challenging.”
To demonstrate the plausibility of a ROBOT attack, the researchers signed a message with the private key of Facebook's HTTPS certificate, meaning they could successfully impersonate the site. Facebook fixed the flaw in October, providing a bug bounty to the research team. The researchers also notified other vulnerable sites and vendors. The ROBOT page has an updated list with the status of their patches.
According to other reports, the flaw is not confined to TLS. There are similar problems in XML Encryption, PKCS#11 interfaces, Javascript Object Signing and Encryption (JOSE), and Cryptographic Message Syntax / S/MIME. The researchers added a ROBOT vulnerability checker on the ROBOT homepage to help other sites.
An attacker still has to be able to intercept existing network traffic to and from the would-be victim to exploit this flaw, which helps reduce the risk. Since it can be used to decrypt encrypted data and sign communications using a site’s private encryption key, website owners should check if they are vulnerable and take the steps to patch or fix the issue.
HIDE
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
Posted in Cybercrime & Digital Threats, Vulnerabilities
Recent Posts
- CES 2025: A Comprehensive Look at AI Digital Assistants and Their Security Risks
- Metaverse or Metaworse? How the Apple Vision Pro Stacks Up Against Predictions
- Understanding Hacktivists: The Overlap of Ideology and Cybercrime
- Across the Span of the Spanish Cybercriminal Underground: Current Activities and Trends
- Bridging Divides, Transcending Borders: The Current State of the English Underground