President Obama wants NSA to come clean about Heartbleed-like bugs

Leak suggests NSA can keep schtum about software bugs that may benefit its activities, but must disclose details about everything else

Security exploits

President Barack Obama wants all major vulnerabilities found by the NSA to be disclosed to protect end users from cyber attacks.

The US president, however, has decreed any vulnerability the NSA could use for "a clear national security or law enforcement need" does not need to be disclosed.

The decision was leaked by senior officials in the Obama administration speaking anonymously to The New York Times.

The information came out after the US government denied any previous knowledge of Heartbleed, the widely reported OpenSSL bug that compromised two-thirds of the internet. The White House stated that it prefers to share the information with the tech industry to protect consumers.

"This process is biased toward responsibly disclosing such vulnerabilities," a spokeswoman for the National Security Council told the Times.

The president's policy allows American agencies to keep schtum about flaws they could use for the purposes of national security, a tool which has proved effective in the past.

Stuxnet, the malware designed by the United States and Israel, used four zero-day vulnerabilities to cripple Iran's nuclear program.

Officials at the NSA and United States Cyber Command said giving up these vulnerabilities would mean "unilateral disarmament," leaving the country exposed to other nation-states' cyber attacks.

"You are not going to see the Chinese give up on zero days' just because we do," said one senior official.

The latter are vulnerabilities in programs the developers have had "zero days" to patch. Google, Mozilla, PayPal and Facebook pay thousands of dollars each year to researchers to find and report them. Microsoft pays $150,000 for exploits in Windows, though you can get similar prices on the black market.

The president's policy also makes no mention of the United State's prolific purchasing of vulnerabilities from private researchers.

"You're basically selling commercial software," said one hacker who deals with multiple American agencies. "The only difference is that you sell one license, ever, and everyone calls you evil."

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download


NSA issues guidance on encrypted DNS usage
Domain Name System (DNS)

NSA issues guidance on encrypted DNS usage

15 Jan 2021

Most Popular

What should you really be asking about your remote access software?

What should you really be asking about your remote access software?

17 Nov 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

30 Nov 2021
What is single sign-on (SSO)?
single sign-on (SSO)

What is single sign-on (SSO)?

2 Dec 2021