AnsweredAssumed Answered

Nessus Scan Vulnerability Remediation - SSL Medium Strength Cipher Suites - Need Assistance

Question asked by mparikh72 Champion on Feb 8, 2019
Latest reply on Feb 11, 2019 by mparikh72

My prod & dev MoM (EM) server has come under a Nessus scan vulnerability that needs immediate remediation. I've also opened up a case (01285297) with CA Support. I'd also like to put it out the Community in-parallel to get additional assistance.

 

Since this is a security hit for my org, it needs to be resolved ASAP or it could affect "authority to operate" for APM altogether.

 

Thanks in advance for any/all help with this issue.

 

Here are the details of the vulnerability:

 

Vulnerabilities

42873 - SSL Medium Strength Cipher Suites Supported
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

 

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
See Also
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
Plugin Output

tcp/5443


Here is the list of medium strength SSL ciphers supported by the remote server :

 

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

 

EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 
ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 

 

The fields above are :

 

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

Outcomes