{"id":25087,"date":"2019-02-09T14:00:21","date_gmt":"2019-02-09T14:00:21","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29806\/New-TLS-Encryption-Busting-Attack-Also-Impacts-TLS-1.3.html"},"modified":"2019-02-09T14:00:21","modified_gmt":"2019-02-09T14:00:21","slug":"new-tls-encryption-busting-attack-also-impacts-tls-1-3","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/","title":{"rendered":"New TLS Encryption Busting Attack Also Impacts TLS 1.3"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/02\/08\/0a5d1c47-913d-41d1-bba8-5f7421a1fa54\/ac7270d7dd1bd14537034f4396dc120c\/tls-13.png\" class=\"\" alt=\"TLS 1.3\"\/><\/span><\/p>\n<p>A team of academics has revealed a new cryptographic attack this week that can break encrypted TLS traffic, allowing attackers to intercept and steal data previously considered safe &amp; secure.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>This new downgrade attack &#8211;which doesn&#8217;t have a fancy name like most cryptography attacks tend to have&#8211; works even against the latest version of the TLS protocol, TLS 1.3, released last spring and considered to be secure.<\/p>\n<p>The new cryptographic attack isn&#8217;t new, per-se. It&#8217;s yet another variation of the original Bleichenbacher oracle attack.<\/p>\n<p>The original attack was named after Swiss cryptographer Daniel Bleichenbacher, who in 1998 demonstrated a first practical attack against systems using RSA encryption in concert with the PKCS#1 v1 encoding function.<\/p>\n<p>Over the years, cryptographers have come up with variations on the original attack, such as in <a href=\"https:\/\/eprint.iacr.org\/2003\/052\" target=\"_blank\" rel=\"noopener noreferrer\">2003<\/a>, <a href=\"https:\/\/eprint.iacr.org\/2012\/417\" target=\"_blank\" rel=\"noopener noreferrer\">2012<\/a>, <a href=\"https:\/\/eprint.iacr.org\/2011\/615.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">2012<\/a>, <a href=\"https:\/\/www.kb.cert.org\/vuls\/id\/772676\/\" target=\"_blank\" rel=\"noopener noreferrer\">2014<\/a>, <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/meyer\" target=\"_blank\" rel=\"noopener noreferrer\">2014<\/a>, <a href=\"https:\/\/www.cs.unc.edu\/~reiter\/papers\/2014\/CCS1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">2014<\/a>, <a href=\"https:\/\/www.nds.rub.de\/media\/nds\/veroeffentlichungen\/2015\/08\/21\/Tls13QuicAttacks.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">2015<\/a>, <a href=\"https:\/\/drownattack.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">2016 (DROWN)<\/a>, <a href=\"https:\/\/robotattack.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">2017 (ROBOT)<\/a>, and <a href=\"https:\/\/www.ei.rub.de\/media\/nds\/veroeffentlichungen\/2018\/08\/13\/sec18-felsch.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">2018<\/a>.<\/p>\n<p>The reason for all these attack variations is because the authors of the TLS encryption protocol decided to add countermeasures to make attempts to guess the RSA decryption key harder, instead of replacing the insecure RSA algorithm.<\/p>\n<p>These countermeasures have been defined in Section 7.4.7.1 of the TLS standard (RFC 5246), which many hardware and software vendors across the years have misinterpreted or failed to follow to the letter of the law.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>These failure in regards to implementing proper mitigations has resulted in many TLS-capable servers, routers, firewalls, VPNs, and coding libraries still being vulnerable to Bleichenbacher attack variations, which found and exploited problems in the incorrect mitigation procedures.<\/p>\n<p>The latest Bleichenbacher attack variations was described in a technical paper published on Wednesday, this week, and entitled &#8220;<a href=\"https:\/\/eprint.iacr.org\/2018\/1173.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">The 9 Lives of Bleichenbacher&#8217;s CAT: New Cache ATtacks on TLS Implementations<\/a>.&#8221;<\/p>\n<p>Seven researchers from all over the world found &#8211;yet again&#8211; another way to break RSA PKCS#1 v1.5, the most common RSA configuration used to encrypt TLS connections nowadays. Besides TLS, this new Bleichenbacher attack also works against Google&#8217;s new QUIC encryption protocol as well.<\/p>\n<p>&#8220;The attack leverages a side-channel leak via cache access timings of these implementations in order to break the RSA key exchanges of TLS implementations,&#8221; researchers said.<\/p>\n<p>Even the newer version of the TLS 1.3 protocol, where RSA usage has been kept to a minimum, can be downgraded in some scenarios to TLS 1.2, where the new Bleichenbacher attack variation works.<\/p>\n<p>&#8220;We tested nine different TLS implementations against cache attacks and seven were found to be vulnerable: <a href=\"http:\/\/openssl.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">OpenSSL<\/a>, <a href=\"https:\/\/aws.amazon.com\/blogs\/security\/introducing-s2n-a-new-open-source-tls-implementation\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon s2n<\/a>, <a href=\"https:\/\/tls.mbed.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">MbedTLS<\/a>, <a href=\"https:\/\/opensource.apple.com\/tarballs\/coreTLS\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple CoreTLS<\/a>, <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/NSS\" target=\"_blank\" rel=\"noopener noreferrer\">Mozilla NSS<\/a>, <a href=\"https:\/\/www.wolfssl.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">WolfSSL<\/a>, and <a href=\"https:\/\/www.gnutls.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">GnuTLS<\/a>,&#8221; researchers said.<\/p>\n<p>Updated versions of all the affected libraries were published concurrently in November 2018, when researchers published an initial draft of their research paper.<\/p>\n<p>For more details, the following CVE identifiers have been assigned to the security bugs enabling this new Bleichenbacher attack: CVE-2018-12404, CVE-2018-19608, CVE-2018-16868, CVE-2018-16869, and CVE-2018-16870.<\/p>\n<p>The two libraries that were not vulnerable were <a href=\"https:\/\/bearssl.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">BearSSL<\/a> and <a href=\"https:\/\/boringssl.googlesource.com\/boringssl\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google&#8217;s BoringSSL<\/a>.<\/p>\n<h3>Related security coverage:<\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29806\/New-TLS-Encryption-Busting-Attack-Also-Impacts-TLS-1.3.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25088,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5785],"class_list":["post-25087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyflawcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New TLS Encryption Busting Attack Also Impacts TLS 1.3 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New TLS Encryption Busting Attack Also Impacts TLS 1.3 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-09T14:00:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/new-tls-encryption-busting-attack-also-impacts-tls-1-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1250\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New TLS Encryption Busting Attack Also Impacts TLS 1.3\",\"datePublished\":\"2019-02-09T14:00:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/\"},\"wordCount\":487,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3.png\",\"keywords\":[\"headline,privacy,flaw,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/\",\"name\":\"New TLS Encryption Busting Attack Also Impacts TLS 1.3 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3.png\",\"datePublished\":\"2019-02-09T14:00:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3.png\",\"width\":1250,\"height\":455},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,flaw,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyflawcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New TLS Encryption Busting Attack Also Impacts TLS 1.3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New TLS Encryption Busting Attack Also Impacts TLS 1.3 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/","og_locale":"en_US","og_type":"article","og_title":"New TLS Encryption Busting Attack Also Impacts TLS 1.3 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-09T14:00:21+00:00","og_image":[{"width":1250,"height":455,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/new-tls-encryption-busting-attack-also-impacts-tls-1-3.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New TLS Encryption Busting Attack Also Impacts TLS 1.3","datePublished":"2019-02-09T14:00:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/"},"wordCount":487,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/new-tls-encryption-busting-attack-also-impacts-tls-1-3.png","keywords":["headline,privacy,flaw,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/","url":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/","name":"New TLS Encryption Busting Attack Also Impacts TLS 1.3 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/new-tls-encryption-busting-attack-also-impacts-tls-1-3.png","datePublished":"2019-02-09T14:00:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/new-tls-encryption-busting-attack-also-impacts-tls-1-3.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/new-tls-encryption-busting-attack-also-impacts-tls-1-3.png","width":1250,"height":455},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-tls-encryption-busting-attack-also-impacts-tls-1-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,flaw,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyflawcryptography\/"},{"@type":"ListItem","position":3,"name":"New TLS Encryption Busting Attack Also Impacts TLS 1.3"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25087"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25087\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25088"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}