Analysis:
During the analysis, we discovered that the servers supported weak RC4 ciphers. Please refer to the below-provided evidence:
Impact:
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker can obtain many (i.e., tens of millions) cipher texts, the attacker may be able to derive the plaintext.
Recommendation:
It is recommended to reconfigure the affected application, if possible, to avoid the use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
Disable SSL RC4 in Windows
1.Open “regedit” from the command line
2.Browse to the following key:
3. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 128/128]
"Enabled"=dword:00000000
4.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128]
"Enabled"=dword:00000000
5.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 56/128]
"Enabled"=dword:00000000
6. You will need to restart the computer for this change to take effect
Comments
Post a Comment