Scanner detected vulnerabilities on TLS1.0 and SSL/TLS
Posted: Mon Apr 21, 2025 9:34 pm
Hi,
one of our customer using some Netonix switches mainly WS-12-250-AC and they ran few security audits and penetration tests.
In despite of upgrading the firmware for the switches to the latest version 1.5.25, The scanner still generates alerts on :
1. TLS1.0 - ssl-enum-ciphers_TLSv1.0_443
SSL/TLS Server supports TLSv1.0. TLS is capable of using a multitude of ciphers (algorithms) to create the public and private key pairs. For example if TLSv1.0 uses either the RC4 stream cipher, or a block cipher in CBC mode.
RC4 is known to have biases and the block cipher in CBC mode is vulnerable to the POODLE attack. TLSv1.0, if configured to use the same cipher suites as SSLv3, includes a means by which a TLS implementation can downgrade the connection to SSL v3.0, thus weakening security. A POODLE-type attack could also be launched directly at TLS without negotiating a downgrade...
2. ssl-dh-params
Diffie-Hellman Key Exchange Insufficient Group Strength
Transport Layer Security (TLS) services that use Diffie-Hellman groups of insufficient strength, especially those using one of a few commonly shared groups, may be susceptible to passive eavesdropping attacks.
Check results: WEAK DH GROUP 1
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Modulus Type: Non-safe prime
Modulus Source: RFC5114/1024-bit DSA group with 160-bit prime order subgroup
Modulus Length: 1024 , Generator Length: 1024 , Public Key Length: 1024
I can't find from the web interface how to deactivate TLS1.0 and the cipher suite "TLS_DHE_RSA_WITH_AES_128_CBC_SHA".
Is there any command line using the "Console" or "SSH" to do the job?
We need to address it otherwise the customer will fail the security audit.
Thank you.
Regards,
Sebastien
one of our customer using some Netonix switches mainly WS-12-250-AC and they ran few security audits and penetration tests.
In despite of upgrading the firmware for the switches to the latest version 1.5.25, The scanner still generates alerts on :
1. TLS1.0 - ssl-enum-ciphers_TLSv1.0_443
SSL/TLS Server supports TLSv1.0. TLS is capable of using a multitude of ciphers (algorithms) to create the public and private key pairs. For example if TLSv1.0 uses either the RC4 stream cipher, or a block cipher in CBC mode.
RC4 is known to have biases and the block cipher in CBC mode is vulnerable to the POODLE attack. TLSv1.0, if configured to use the same cipher suites as SSLv3, includes a means by which a TLS implementation can downgrade the connection to SSL v3.0, thus weakening security. A POODLE-type attack could also be launched directly at TLS without negotiating a downgrade...
2. ssl-dh-params
Diffie-Hellman Key Exchange Insufficient Group Strength
Transport Layer Security (TLS) services that use Diffie-Hellman groups of insufficient strength, especially those using one of a few commonly shared groups, may be susceptible to passive eavesdropping attacks.
Check results: WEAK DH GROUP 1
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Modulus Type: Non-safe prime
Modulus Source: RFC5114/1024-bit DSA group with 160-bit prime order subgroup
Modulus Length: 1024 , Generator Length: 1024 , Public Key Length: 1024
I can't find from the web interface how to deactivate TLS1.0 and the cipher suite "TLS_DHE_RSA_WITH_AES_128_CBC_SHA".
Is there any command line using the "Console" or "SSH" to do the job?
We need to address it otherwise the customer will fail the security audit.
Thank you.
Regards,
Sebastien