cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
386
Views
0
Helpful
5
Replies

Weak SSL/TLS Key Exchange

Hi 

I hope your doing well 

in our network infrastructure  where we have Qualys to scan for vulnerabilities i can't find a solution for this certain vulnerability here are the details :

Weak SSL/TLS Key Exchange 

impact an attacker with access to sufficient computational power might be able to recover the session key and decrypt session content 

i have tried the suggested solution from both community cisco but when we i scan again the vulnerability remains the same , the solution that i have tried is to disable SSL/TLS on the switches after scanning it still shows the same vulnerability ,also i have tried to configure the cipher suite with AES 256 the vulnerability remains the same .

the switch we have is cisco 9200 version 17.6

best regards

1 Accepted Solution

Accepted Solutions

Dears 

after a while we changed the ssh port number (default is 22) to another port also we blocked 22 port then the vulnerability was removed this is the solution that we found if you have any other solution please let us know 

best regards 

View solution in original post

5 Replies 5

@mohammedalrawiib what commands did you configure? Provide the configuration.

Did you use the command - no ip http secure-server to disable https server?

You could also apply an ACL to restrict traffic to trusted sources, that would help mitigate the issue.

Yes i tried to use the command no ip http secure-server but the vulnerability remains in the scan report 

@mohammedalrawiib with that command, https on the switch is disabled and should not respond.

Are you sure a new scan was run after that command was configured?

Provide your configuration

 

tried to scan 2 times and the vulnerability still remains is there anything i can try ?

can't provide configuration right now, will provide on Sunday 

regards 

Dears 

after a while we changed the ssh port number (default is 22) to another port also we blocked 22 port then the vulnerability was removed this is the solution that we found if you have any other solution please let us know 

best regards 

Review Cisco Networking for a $25 gift card