Analysis:
During the analysis, it was observed that the remote host supports RSA_EXPORT cipher suites with keys less than or equal to 512 bits. Please refer to the below-provided evidence:
Impact:
An attacker can factor a 512-bit RSA modulus in a short amount of time.
A man-in-the-middle attacker may be able to downgrade the session to use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is recommended to remove support for weak cipher suites.
Recommendation:
It is recommended to reconfigure the service to remove support for EXPORT_RSA cipher suites.
Comments
Post a Comment