Cyber Security News

Millions Of RSA Key Exposes Serious Flaws That Can Be Exploited

A disturbing security vulnerability has been uncovered affecting RSA encryption keys used across the internet, with researchers discovering that approximately 1 in 172 certificates found online are susceptible to compromise through a mathematical attack.

This widespread vulnerability primarily impacts Internet of Things (IoT) devices but could potentially affect any system using improperly generated RSA keys.

The vulnerability stems from inadequate random number generation during key creation, particularly in devices with limited entropy sources.

When RSA keys are generated without sufficient randomness, they may share prime factors with other keys, making them vulnerable to factorization attacks.

Keyfactor Security researchers identified this critical issue after analyzing over 75 million RSA certificates collected from across the internet.

Their analysis revealed that 435,000 certificates were compromised using a relatively simple mathematical technique, representing a significant security risk to affected systems.

The attack exploits a fundamental property of RSA cryptography: if two different RSA keys share a prime factor, both can be broken by computing the Greatest Common Divisor (GCD).

While the standard factorization of large RSA moduli is computationally infeasible, calculating the GCD between two numbers that share a factor is trivial. Once a shared factor is found, the private key can be completely reconstructed.

Technical Details Behind The Attack

The researchers implemented an efficient GCD computation using the GNU MultiPrecision (GMP) library on a single cloud-based virtual machine.

Rather than performing quadratic numbers of pairwise GCD calculations, they used a product tree and remainder tree approach that runs in sub-quadratic time. The algorithm can be expressed mathematically as:-

GCD(nᵢ, n₁ * … * nᵢ₋₁ * nᵢ₊₁ … * nₘ) = GCD(nᵢ, (n₁ * n₂ * … * nₘ mod nᵢ²)/nᵢ)

The research found that IoT devices were particularly vulnerable, with approximately 50% of compromised certificates containing the name of a large network equipment manufacturer.

Many affected devices continued to use vulnerable keys even after previous security warnings, underscoring the challenge of patching IoT systems in the field.

The implications are especially concerning as IoT devices proliferate in sensitive settings like operating rooms, vehicles, and industrial control systems.

Researchers emphasize that device manufacturers must ensure their products have sufficient entropy sources and adhere to cryptographic best practices to protect users from these preventable vulnerabilities.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities

Along with the release of Kali Linux 2025.3, a major update introduces an innovative tool that…

1 hour ago

New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands

ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…

17 hours ago

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…

17 hours ago

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…

18 hours ago

175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…

18 hours ago

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…

19 hours ago