cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3630
Views
0
Helpful
2
Replies

ASA PCI Compliance Scan Weak SSL/TLS Key Exchange Failure

keithcclark71
Level 3
Level 3

Can someone explain to me what I need to actually do per the Solution of this report below? I have a SSL certificate on the 444 port this report is complaining about which is used for anyconnect so I don't understand why this would be seen as weak key exchange. the cert was issued from namecheap and should meet requirements

 

 

SOLUTION:
Change the SSL/TLS server configuration to only allow strong key exchanges. Key exchanges should provide at least 112 bits of security, which translates to a minimum
key size of 2048 bits for Diffie Hellman and RSA key exchanges.
IMPACT:
An attacker with access to sufficient computational power might be able to recover the session key and decrypt session content.
THREAT:
QID Detection Logic:
For a SSL enabled port, the scanner probes and maintains a list of supported SSL/TLS versions. For each supported version, the scanner does a SSL handshake to get a
list of KEX methods supported by the server. It reports all KEX methods that are considered weak. The criteria of a weak KEX method is as follows:
The SSL/TLS server supports key exchanges that are cryptographically weaker than recommended. Key exchanges should provide at least 112 bits of security, which
translates to a minimum key size of 2048 bits for Diffie Hellman and RSA key exchanges.
CVSS Base Score: 4.0 AV:N/AC:H/Au:N/C:P/I:P/A:N
CVSS Temporal Score: 2.9 E:U/RL:W/RC:UC
Severity: 4
QID: 38863
Category: General remote services
CVE ID: -
Vendor Reference: -
Bugtraq ID: -
Last Update: 2022-07-21 21:49:33.0
VULNERABILITY DETAILS
PCI Severity Level:

Automatic Failure: Components that support SSL v2.0 or older, OR SSL v3.0/TLS with 128-bit encryption in conjunction with SSL v2.0
The vulnerability is not included in the NVD.

PCI COMPLIANCE STATUS
Weak SSL/TLS Key Exchange port 444 / tcp over ssl

2 Replies 2

@keithcclark71 change the ciphers to something more secure as per the example guide here https://integratingit.wordpress.com/2021/01/27/securing-asa-tls-ciphers/ you can either select the "high" secure ciphers, or create a custom list of your preferred ciphers.

 

 

SSL cipher have four level each one level come with specific cipher 
ssh cipher integrity 
ssh cipher encryption 

if the Cipher you use with Server is contain DH or ECDH you can change the group via 
ssl dh-group <-select 14 or 24 
ssl ecdh-group 

Review Cisco Networking for a $25 gift card