Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.106223
Categoría:SSL and TLS
Título:SSL/TLS: Diffie-Hellman Key Exchange Insufficient DH Group Strength Vulnerability
Resumen:The SSL/TLS service uses Diffie-Hellman groups with insufficient; strength (key size < 2048).
Descripción:Summary:
The SSL/TLS service uses Diffie-Hellman groups with insufficient
strength (key size < 2048).

Vulnerability Insight:
The Diffie-Hellman group are some big numbers that are used as
base for the DH computations. They can be, and often are, fixed. The security of the final secret
depends on the size of these parameters. It was found that 512 and 768 bits to be weak, 1024 bits
to be breakable by really powerful attackers like governments.

Vulnerability Impact:
An attacker might be able to decrypt the SSL/TLS communication
offline.

Affected Software/OS:
All services providing an encrypted communication using
Diffie-Hellman groups with insufficient strength.

Solution:
- Deploy (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE) or use
a 2048-bit or stronger Diffie-Hellman group. Please see the references for more resources
supporting you with this task.

- For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which
include primes with lengths of more than 1024 bits.

CVSS Score:
4.0

CVSS Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:N

CopyrightCopyright (C) 2016 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.