VulnerabilitiesHIGH

Vulnerabilities - Qihoo 360 Exposes Wildcard SSL Private Key

CSCyber Security News·Reporting by Guru Baran
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, Qihoo 360 accidentally shared a secret key that protects user data, making it vulnerable to hackers.

Quick Summary

Qihoo 360 has leaked its wildcard SSL private key in a public installer. This exposes users to serious security risks, including data interception and impersonation. The company is taking steps to mitigate the fallout.

The Flaw

On March 16, 2026, Qihoo 360, China's largest cybersecurity firm, made a significant operational security blunder. The company bundled its wildcard SSL private key within the public installer of its newly launched AI assistant, 360Qihoo (also known as Security Claw). This key, which is crucial for establishing secure connections, was found unprotected in the installer package. Researchers discovered it while inspecting the directory structure of the software.

The wildcard SSL certificate, issued by WoTrus CA Limited, is valid for all subdomains under the myclaw.360.cn domain. The exposure of this key poses serious risks, as it allows potential attackers to perform high-impact actions, such as intercepting user traffic and impersonating legitimate servers.

What's at Risk

The implications of this leak are extensive. With possession of the wildcard SSL private key, an attacker could execute a Man-in-the-Middle (MitM) attack, decrypting all traffic between users and the AI servers. They could also create a fake endpoint that browsers would trust, leading to credential harvesting through convincing login pages. Furthermore, attackers could hijack AI sessions, manipulating queries sent to the backend.

The entire infrastructure of myclaw.360.cn was theoretically compromised the moment the installer was made public. This extensive breach highlights the critical importance of secure software development practices, particularly for a firm trusted by over 461 million users.

Patch Status

Following the public disclosure of the leak, Qihoo 360 took immediate action to revoke the compromised certificate. However, the revocation process is not instantaneous. Due to the behavior of Online Certificate Status Protocol (OCSP) caching, some clients may still receive a valid status response from cached lookups. This means that even after revocation, the risk persists until all caches are updated.

The timing of this incident is particularly embarrassing for Qihoo 360. The company's founder had publicly assured users that Security Claw would never leak passwords, a promise that was broken before the product's launch day ended.

Immediate Actions

For users of Qihoo 360's products, it is crucial to remain vigilant. Here are some steps you can take:

  • Change passwords: If you have used the AI assistant, consider changing your passwords for any accounts accessed through it.
  • Monitor accounts: Keep an eye on your accounts for any suspicious activity.
  • Stay updated: Follow Qihoo 360's communications for updates on the situation and any further security measures they may implement.

This incident serves as a stark reminder of the importance of operational security. Companies must prioritize secure coding practices to protect user data and maintain trust.

🔒 Pro insight: This incident underscores the critical need for rigorous operational security practices in software development to prevent similar leaks.

Original article from

CSCyber Security News· Guru Baran
Read Full Article

Related Pings

CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

A critical zero-day vulnerability in FortiClient EMS is actively exploited. Fortinet has released emergency patches and urges immediate action from users.

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

A serious vulnerability in TrueConf video conferencing software is being exploited by Chinese hackers. CISA has mandated a two-week patch deadline for federal agencies. Immediate action is essential to safeguard sensitive data and communications.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·
HIGHVulnerabilities

MetInfo CMS Vulnerability - PHP Code Injection Risk

A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.

Full Disclosure·