Analysis:
During the analysis, it was observed that servers were vulnerable to SWEET32 vulnerability, due to use of weak 64-bit ciphers. Please refer to the below-mentioned evidence.
Impact:
Ciphers that use 3DES are prone to attacks, where an attacker who can cause enough cryptographic collisions can recover a stored session cookie or other sensitive information using malicious JavaScript.
Recommendation:
It is recommended to stop the use of all 64-bit block ciphers. Alternatively, place limitations on the number of requests that can be processed over the same TLS connection to mitigate this vulnerability.
Comments
Post a Comment