Analysis:
During analysis, it was observed that the SSL certificate was signed using the cryptographically weak algorithm SHA1. Please refer to the below-provided evidence:
Impact:
These signature algorithms are known to be vulnerable to collision attacks. A determined attacker may be able to leverage this weakness to generate another certificate with the same digital signature which could allow the attacker to masquerade as the affected service.
Recommendation:
It is recommended that the certificate should not be signed using weak hashing algorithms (e.g. MD2, MD4, MD5, or SHA1). It's recommended that the certificate should be signed using a strong hashing algorithm like SHS-256
Comments
Post a Comment