08-01-2022 09:47 AM
Can someone explain to me what I need to actually do per the Solution of this report below? I have a SSL certificate on the 444 port this report is complaining about which is used for anyconnect so I don't understand why this would be seen as weak key exchange. the cert was issued from namecheap and should meet requirements
SOLUTION:
Change the SSL/TLS server configuration to only allow strong key exchanges. Key exchanges should provide at least 112 bits of security, which translates to a minimum
key size of 2048 bits for Diffie Hellman and RSA key exchanges.
IMPACT:
An attacker with access to sufficient computational power might be able to recover the session key and decrypt session content.
THREAT:
QID Detection Logic:
For a SSL enabled port, the scanner probes and maintains a list of supported SSL/TLS versions. For each supported version, the scanner does a SSL handshake to get a
list of KEX methods supported by the server. It reports all KEX methods that are considered weak. The criteria of a weak KEX method is as follows:
The SSL/TLS server supports key exchanges that are cryptographically weaker than recommended. Key exchanges should provide at least 112 bits of security, which
translates to a minimum key size of 2048 bits for Diffie Hellman and RSA key exchanges.
CVSS Base Score: 4.0 AV:N/AC:H/Au:N/C:P/I:P/A:N
CVSS Temporal Score: 2.9 E:U/RL:W/RC:UC
Severity: 4
QID: 38863
Category: General remote services
CVE ID: -
Vendor Reference: -
Bugtraq ID: -
Last Update: 2022-07-21 21:49:33.0
VULNERABILITY DETAILS
PCI Severity Level:
Automatic Failure: Components that support SSL v2.0 or older, OR SSL v3.0/TLS with 128-bit encryption in conjunction with SSL v2.0
The vulnerability is not included in the NVD.
PCI COMPLIANCE STATUS
Weak SSL/TLS Key Exchange port 444 / tcp over ssl
08-01-2022 09:58 AM - edited 08-01-2022 10:10 AM
@keithcclark71 change the ciphers to something more secure as per the example guide here https://integratingit.wordpress.com/2021/01/27/securing-asa-tls-ciphers/ you can either select the "high" secure ciphers, or create a custom list of your preferred ciphers.
08-01-2022 10:26 AM - edited 08-01-2022 11:46 AM
SSL cipher have four level each one level come with specific cipher
ssh cipher integrity
ssh cipher encryption
if the Cipher you use with Server is contain DH or ECDH you can change the group via
ssl dh-group <-select 14 or 24
ssl ecdh-group
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide