Guarding against Heartbleed not so simple

Placeholder Image for Article Template

The Department of Homeland Security's cybersecurity chief said the ongoing assessment of the impact of the Heartbleed OpenSSL flaw on federal IT systems will take time -- and IT security experts warned it might take even longer than initially expected.

In an April 18 post on the agency's website, Phyllis Schneck, DHS' deputy undersecretary for cybersecurity, said the vulnerability was unusual in its reach, ease of use and length of time before it was discovered.

"It is important to note that it takes time to address this issue properly," she wrote. She urged agencies to identify where the vulnerability is, formulate a response and implement that response without inflicting harm on critical systems.

DHS, the Internal Revenue Service and other agencies have declared that their sites were not threatened by Heartbleed. The Defense Department joined that chorus on April 19, when Deputy CIO Richard Hale said the software bug has no effect on DOD's classified networks and minimal effect on its unclassified sites. Upon learning of the OpenSSL flaw, Hale said, DOD immediately blocked "the exploitation of this vulnerability at the boundary between the department's network and the Internet."

Yet Schneck's recommendations and recent steps taken with logins show that agencies are proceeding carefully and still determining the full effects of the flaw.

IT security experts agreed that Heartbleed's impact could be insidious and long-lasting for federal systems. "With security, you never know when you're done," said Sushil Jajodia, director of the Center for Secure Information Systems at George Mason University. Heartbleed can be fixed by patching vulnerable equipment such as servers, but security issues evolve, he added.

Heartbleed is a very slippery problem that could open up more ways for criminals or even nation states to sneak into federal IT systems and steal information, said Angelos Stavrou, associate professor of computer science at GMU's Volgenau School of Engineering. One exploit, dubbed Reverse Heartbleed, could be particularly troubling for DHS, said Stavrou, who works mainly on national security projects. Meldium, the firm that discovered the variant on the exploit, said Reverse Heartbleed allows access to networks even though underlying servers have been patched.

According to a statement on Meldium's website, the most straightforward Heartbleed attack would be "a malicious client attacking an HTTPS server to steal cookies, private keys and other secrets." However, "a malicious server can also send bad heartbeat packets to a client that uses OpenSSL and extract data from that client. The [Transport Layer Security] heartbeats used in this attack are symmetric: They can be initiated by either the 'client' or the 'server' in a TLS connection, and both endpoints use the same vulnerable parsing code."

Stavrou said that means DHS and large federal IT agencies not only have to patch hundreds of servers but also have to keep a close eye on external devices at companies and other entities that work with federal agencies.

Meldium said the reverse attack can affect browsers, applications that use HTTP APIs (everything from Dropbox to Microsoft Office) and many mobile apps that run on iOS and Android. "It could be easy to direct one of those clients to connect to a malicious server (as in the case of a Web browser), or it might require a man-in-the-middle attack to redirect a client to an evil endpoint," the company states on its website.

With Reverse Heartbleed, "the problem went from hundreds of servers to thousands of client devices," Stavrou said. He advised federal IT managers to quickly take advantage of patches being offered by IT gear makers such as Cisco Systems and others.

Neither Stavrou nor Jajodia would speculate on how long it might take the government to apply patches to all vulnerable federal systems, but both said the job would eventually get done.

In her April 18 post, Schneck advised agencies that use OpenSSL to update to secure versions of the open-source code, reissue certificates for their websites and ask users to reset passwords.

The federal government "is working at an aggressive yet appropriate pace in our response and acting out of an abundance of caution," she wrote.

The government has enabled network defenses across agencies to detect anyone trying to use the exploit and in many cases to block those attempts, she said. Officials have also started scanning for the Heartbleed vulnerability in IT operations.

FCW staff writer Sean Lyngaas contributed to this report.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at or follow him on Twitter at @MRockwell4.


  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.