![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.106223 |
Category: | SSL and TLS |
Title: | SSL/TLS: Diffie-Hellman Key Exchange Insufficient DH Group Strength Vulnerability |
Summary: | The SSL/TLS service uses Diffie-Hellman groups with insufficient; strength (key size < 2048). |
Description: | Summary: The SSL/TLS service uses Diffie-Hellman groups with insufficient strength (key size < 2048). Vulnerability Insight: The Diffie-Hellman group are some big numbers that are used as base for the DH computations. They can be, and often are, fixed. The security of the final secret depends on the size of these parameters. It was found that 512 and 768 bits to be weak, 1024 bits to be breakable by really powerful attackers like governments. Vulnerability Impact: An attacker might be able to decrypt the SSL/TLS communication offline. Affected Software/OS: All services providing an encrypted communication using Diffie-Hellman groups with insufficient strength. Solution: - Deploy (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE) or use a 2048-bit or stronger Diffie-Hellman group. Please see the references for more resources supporting you with this task. - For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which include primes with lengths of more than 1024 bits. CVSS Score: 4.0 CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N |
Copyright | Copyright (C) 2016 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |