Sunday, April 27, 2025
HomeCyber AttackNorway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

Published on

SIEM as a Service

Follow Us on Google News

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS) based VPN solutions, like SSLVPN and WebVPN, should be replaced with safer options.

Bad people are still taking advantage of flaws in these VPN services, which is why this suggestion was made.

ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service

- Advertisement - Google News

Critical Vulnerabilities in SSLVPN

The NCSC has long known that SSLVPN systems have major security holes and has been reporting them.

People have used these flaws many times, which is why the NCSC is pushing for a switch to safer remote access technologies, as per reports by NSM.

Internet Protocol Security (IPsec) with Internet Key Exchange (IKEv2) is suggested as an alternative.

This is also what cybersecurity authorities in other countries propose.

This suggestion’s main goal is to reduce the attack area and vulnerabilities of secure remote access.

The NCSC says new vulnerabilities that haven’t been seen before will likely appear in SSLVPN products.

IPsec has some flaws with IKEv2, but it has a smaller attack area and can handle more configuration mistakes.

The NCSC suggests that companies make a plan to gradually stop using SSLVPN and switch to IPsec IKEv2 to lower the risks that come with using VPNs for remote access.

How difficult this transition will be will depend on factors such as the size of the business, the number of employees, the network architecture, the choice of supplier, and the area where it will be used.

By the end of 2025, all companies will have switched from SSLVPN to IPsec IKEv2.

Businesses affected by the Security Act or considered socially important should have made the change by the end of 2024.

Steps for Implementation

Change how existing VPN solutions are set up: Set VPNs up now to work with IPsec IKEv2.

If that’s not possible, make plans for a backup.

  • Move systems and users: Change all servers and users from SSLVPN to IPsec IKEv2.
  • Turn Off SSLVPN Features: Ensure SSLVPN features are off, and destinations are not responding.
  • Stop All TLS Traffic From Coming In: Stop all TLS traffic from entering the VPN server.
  • Use Certificate identification: To make things safer, use certificate-based identification.

The NCSC suggests the following steps to keep things safe during the changeover period:

  • Centralized Logging: Make sure that VPN services log all of your actions to a central system so that you can quickly find and stop any suspicious activity.
  • Geofencing: Only let traffic from the countries you need come in.
  • Block Unsafe Infrastructure: Don’t let people in from unsafe sources like VPN providers, Tor exit nodes, and VPS providers that offer anonymization services.

The NCSC recommends using 5G mobile or mobile broadband instead of setting up an IPsec link when that is impossible.

Also, modern, safe built-in solutions for operating systems are suggested, like Always On VPN (not DirectAccess) on Windows or solutions based on the WireGuard protocol, as long as they include security features like managing users and machines and keeping a central log of logins and activity.

In its suggestion, the NCSC stresses how important it is for businesses to improve their security by switching from SSLVPN to safer options like IPsec IKEv2.

By doing this, organizations can protect their remote access systems and make themselves much less vulnerable to cyberattacks.

Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...