Analysis:
During the analysis, it was observed that the above-mentioned remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. Please refer to the below-provided evidence:
Impact:
It is recommended to disable SSL 2.0 and 3.0. and implement TLS 1.2 or higher with strongly approved cipher suites.
Recommendation:
These versions of SSL are affected by several cryptographic flaws. An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.
NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC'S definition of 'strong cryptography.
Comments
Post a Comment