CVE-2014-3495

7.5 HIGH

📋 TL;DR

CVE-2014-3495 is an SSL certificate verification vulnerability in duplicity backup software that allows man-in-the-middle attackers to intercept and modify encrypted backup communications. This affects users of duplicity 0.6.24 who perform backups over HTTPS or SFTP connections. The vulnerability enables attackers to potentially access or tamper with sensitive backup data.

💻 Affected Systems

Products:
  • duplicity
Versions: 0.6.24
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects duplicity when using SSL/TLS connections (HTTPS, SFTP with SSL). Local backups and non-SSL protocols are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept, decrypt, modify, or inject malicious content into backup streams, potentially compromising sensitive data or introducing malware into backup archives.

🟠

Likely Case

Man-in-the-middle attackers could intercept backup communications in untrusted networks, potentially accessing sensitive backup data or preventing successful backups.

🟢

If Mitigated

With proper network segmentation and certificate pinning, risk is limited to attackers with privileged network access who can bypass additional controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires man-in-the-middle position on network path between duplicity client and backup server.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.6.25 and later

Vendor Advisory: https://access.redhat.com/security/cve/cve-2014-3495

Restart Required: No

Instructions:

1. Update duplicity to version 0.6.25 or later using your package manager. 2. For RedHat/CentOS: 'yum update duplicity'. 3. For Debian/Ubuntu: 'apt-get update && apt-get install duplicity'. 4. Verify the update with 'duplicity --version'.

🔧 Temporary Workarounds

Use SSH instead of HTTPS/SFTP

linux

Configure duplicity to use SSH/SCP instead of HTTPS or SFTP with SSL

duplicity --ssh-options="-o StrictHostKeyChecking=yes" source scp://user@host/path

Use local or trusted network backups

all

Perform backups to local storage or within trusted network segments only

🧯 If You Can't Patch

  • Segment backup network traffic to trusted paths only, avoiding public or untrusted networks
  • Implement certificate pinning at network level using firewalls or proxies that validate SSL certificates

🔍 How to Verify

Check if Vulnerable:

Run 'duplicity --version' and check if version is 0.6.24. Also check if backups use HTTPS or SFTP protocols.

Check Version:

duplicity --version

Verify Fix Applied:

Run 'duplicity --version' and confirm version is 0.6.25 or later. Test backup with invalid SSL certificate to ensure it fails.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSL certificate validation messages
  • Unexpected backup failures over HTTPS/SFTP
  • Backup connections to unexpected IP addresses

Network Indicators:

  • Unusual SSL/TLS handshake patterns
  • Backup traffic to non-standard ports
  • MITM tools like sslstrip in network traffic

SIEM Query:

source="duplicity.log" AND ("SSL" OR "certificate") AND ("failed" OR "error" OR "warning")

🔗 References

📤 Share & Export