Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Red 15 SSL vulnerability

Hi,

It amazes me that this is a know long standing critical vulnerability and that a security device from a security vendor hasn’t been able to address this.

Security Warnin

   
 

  Security Warning found on port/service "3400 / tcp / "

g found on pSerort/service "3400 / tcp /

Status

 

Automatic Failure as listed by the PCI SSC (This must be resolved for your device

 

 

    Plugin

 

 "SSL Version 2 (v2) Protocol Detection"

 
 

    Category

 

 "Service detection "

 
   

    Priority

 

 "Medium Priority

 

    Synopsis

 
 

   The remote service encrypts traffic using a protocol with known weaknesses.

 
 

    Description

    The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including:

 - An insecure padding scheme with CBC ciphers.

 - Insecure session renegotiation and resumption schemes.

An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.

Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely.

NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'.

 
   
   
 

See also:

 

https://www.schneier.com/academic/paperfiles/paper-ssl.pdf

 
 

http://www.nessus.org/u?0bb7b67d

 
 

http://www.nessus.org/u?247c4540

 
 

https://www.openssl.org/~bodo/ssl-poodle.pdf

 
 

http://www.nessus.org/u?5d15ba70

 
 

https://www.imperialviolet.org/2014/10/14/poodle.html

 
 

https://tools.ietf.org/html/rfc7507

 
 

https://tools.ietf.org/html/rfc7568

 
     

    Risk factor

   MEDIUM / CVSS BASE SCORE :5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

 
     
 

Plugin
output

 

   
- SSLv3 is enabled and the server supports at least one cipher.

 
   
 

Solution

 

   Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.1 (with approved cipher suites) or higher instead.

 

Any advice on how to fix this?

 

 

 



This thread was automatically locked due to age.
Parents Reply Children
No Data
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?