Skip to content

Latest commit

 

History

History
34 lines (25 loc) · 1.68 KB

insecure-ssl-protocol-version-2-supported.md

File metadata and controls

34 lines (25 loc) · 1.68 KB
name severity cvss-score cvss-vector cwe-id cwe-name compliance
Insecure SSL protocol version 2 supported
medium
5.9
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
HIPAA ISO 27001 owasp10 pci PCI v4.0
164.306(a), 164.312(c)(1), 164.312(e)(1)
A.5.14, A.8.9, A.8.24
A2
4.1, 6.5.4
pci4-4.2.1, pci4-6.2.4

SSL protocol version 2 is outdated and insecure. This version has multiple design flaws that may allow an attacker to eavesdrop on SSL-enabled communications.

SSL version 2 is particularly insecure since multiple practical vulnerabilities have been shown, making it easy to intercept any communication where SSL version 2 is used.

In any case, the attacker needs to be positioned between any endpoint participating in the connection, so it can eavesdrop and intercept the communications. This is fairly common, considering the frequency people establish connections over open Wi-Fi.

How to fix

{% tabs insecure-ssl-protocol-version-2-supported %} {% tab insecure-ssl-protocol-version-2-supported generic %} To fix this vulnerability, you need to disable SSL version 2, and enable TLS 1.2 and TLS 1.3, if they are not enabled already.

You should disable SSL 2, and enable TLS 1.2 and above. If you are keeping SSL and older TLS versions (i.e. TLS <= 1.1) enabled to support "older devices", do note that as of 2018, TLS 1.2 is at 94%+ adoption. So there is a strong argument to keep only TLS 1.2 and above enabled.

You must change the web server configuration to enable or disable the protocols, so this will depend on your particular web server configuration procedures. {% endtab %}

{% endtabs %}