POODLE stands for Padding Oracle On Downgraded Legacy Encryption.
It’s a weakness found in SSL 3.0, an old version of the encryption protocol used to secure websites (before TLS).

Think of SSL 3.0 like an old lock on a door. It still works, but it’s weak compared to modern locks. Hackers found a way to break that lock and peek inside.

How the Attack Works
1. Downgrade Trick – Normally, websites use newer security (TLS). But if something goes wrong, the browser and server might “fall back” to SSL 3.0. A hacker can force this fallback.
2. Weak Spot – SSL 3.0 has a flaw in how it adds “padding” (extra data) to messages.
3. Guessing Game – By sending many fake requests, a hacker can slowly guess the hidden data, like session cookies.
This lets the hacker steal private information if they’re on the same network (like public Wi-Fi).

When Did It Happen?
The POODLE attack was first discovered in 2014. Some follow-up versions also targeted TLS in late 2014.
How It Was Fixed
The fix was straightforward:
1. Disable SSL 3.0 – Servers and browsers stopped using SSL 3.0 completely.
2. Add TLS_FALLBACK_SCSV – A safety feature was added so hackers can’t force a downgrade to SSL 3.0.
3. Update Software – Vendors patched their TLS libraries to fix padding issues.
4. Move to TLS 1.2 and TLS 1.3 – These newer versions are much stronger and don’t have the same problem.

Leave a Reply

Your email address will not be published. Required fields are marked *