Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.106223
Category:SSL and TLS
Title:SSL/TLS: Diffie-Hellman Key Exchange Insufficient DH Group Strength Vulnerability
Summary:The SSL/TLS service uses Diffie-Hellman groups with insufficient; strength (key size < 2048).
Description:Summary:
The SSL/TLS service uses Diffie-Hellman groups with insufficient
strength (key size < 2048).

Vulnerability Insight:
The Diffie-Hellman group are some big numbers that are used as
base for the DH computations. They can be, and often are, fixed. The security of the final secret
depends on the size of these parameters. It was found that 512 and 768 bits to be weak, 1024 bits
to be breakable by really powerful attackers like governments.

Vulnerability Impact:
An attacker might be able to decrypt the SSL/TLS communication
offline.

Affected Software/OS:
All services providing an encrypted communication using
Diffie-Hellman groups with insufficient strength.

Solution:
- Deploy (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE) or use
a 2048-bit or stronger Diffie-Hellman group. Please see the references for more resources
supporting you with this task.

- For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which
include primes with lengths of more than 1024 bits.

CVSS Score:
4.0

CVSS Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:N

CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.