CVE-2014-3495
📋 TL;DR
CVE-2014-3495 is an SSL certificate verification vulnerability in duplicity backup software that allows man-in-the-middle attackers to intercept and modify encrypted backup communications. This affects users of duplicity 0.6.24 who perform backups over HTTPS or SFTP connections. The vulnerability enables attackers to potentially access or tamper with sensitive backup data.
💻 Affected Systems
- duplicity
📦 What is this software?
Duplicity by Debian
Opensuse by Opensuse
Opensuse by Opensuse
⚠️ Risk & Real-World Impact
Worst Case
Attackers could intercept, decrypt, modify, or inject malicious content into backup streams, potentially compromising sensitive data or introducing malware into backup archives.
Likely Case
Man-in-the-middle attackers could intercept backup communications in untrusted networks, potentially accessing sensitive backup data or preventing successful backups.
If Mitigated
With proper network segmentation and certificate pinning, risk is limited to attackers with privileged network access who can bypass additional controls.
🎯 Exploit Status
Exploitation requires man-in-the-middle position on network path between duplicity client and backup server.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.6.25 and later
Vendor Advisory: https://access.redhat.com/security/cve/cve-2014-3495
Restart Required: No
Instructions:
1. Update duplicity to version 0.6.25 or later using your package manager. 2. For RedHat/CentOS: 'yum update duplicity'. 3. For Debian/Ubuntu: 'apt-get update && apt-get install duplicity'. 4. Verify the update with 'duplicity --version'.
🔧 Temporary Workarounds
Use SSH instead of HTTPS/SFTP
linuxConfigure duplicity to use SSH/SCP instead of HTTPS or SFTP with SSL
duplicity --ssh-options="-o StrictHostKeyChecking=yes" source scp://user@host/path
Use local or trusted network backups
allPerform backups to local storage or within trusted network segments only
🧯 If You Can't Patch
- Segment backup network traffic to trusted paths only, avoiding public or untrusted networks
- Implement certificate pinning at network level using firewalls or proxies that validate SSL certificates
🔍 How to Verify
Check if Vulnerable:
Run 'duplicity --version' and check if version is 0.6.24. Also check if backups use HTTPS or SFTP protocols.
Check Version:
duplicity --version
Verify Fix Applied:
Run 'duplicity --version' and confirm version is 0.6.25 or later. Test backup with invalid SSL certificate to ensure it fails.
📡 Detection & Monitoring
Log Indicators:
- Failed SSL certificate validation messages
- Unexpected backup failures over HTTPS/SFTP
- Backup connections to unexpected IP addresses
Network Indicators:
- Unusual SSL/TLS handshake patterns
- Backup traffic to non-standard ports
- MITM tools like sslstrip in network traffic
SIEM Query:
source="duplicity.log" AND ("SSL" OR "certificate") AND ("failed" OR "error" OR "warning")
🔗 References
- https://access.redhat.com/security/cve/cve-2014-3495
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3495
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-3495
- https://security-tracker.debian.org/tracker/CVE-2014-3495
- https://access.redhat.com/security/cve/cve-2014-3495
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3495
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-3495
- https://security-tracker.debian.org/tracker/CVE-2014-3495