Skip to content

Latest commit

 

History

History
30 lines (23 loc) · 1.51 KB

secure-renegotiation-is-not-supported.md

File metadata and controls

30 lines (23 loc) · 1.51 KB
name severity cvss-score cvss-vector cwe-id cwe-name compliance
Secure Renegotiation is not supported
low
4.2
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CWE-264
Permissions, Privileges, and Access Controls
HIPAA ISO 27001 owasp10 pci PCI v4.0
164.306(a), 164.312(c)(1), 164.312(e)(1)
A.5.14, A.8.9, A.8.24
A2
4.1, 6.5.4
pci4-4.2.1, pci4-6.2.4

This SSL/TLS implementation does not appear to handle renegotiation handshakes properly. This may allow an attacker to insert malicious data into the HTTPS connection. A malicious renegotiation allows clients and servers to modify the encryption parameters of an existing connection, for instance to require a weaker authentication mechanism.

To successfully exploit this vulnerability, the attacker must be able to perform a man-in-the-middle attack, which typically means the attacker is physically close to either the target server or the target victim. This situation is more likely to occur in wireless connections.

The CVE for this type of vulnerability is CVE-2009-3555.

How to fix

{% tabs secure-renegotiation-is-not-supported %} {% tab secure-renegotiation-is-not-supported generic %} You can fix this problem by disabling support for the insecure renegotiation or by enabling support only for secure renegotiation. Secure renegotiation implements a different handshake for the renegotiation, making it unfeasible for the attacker to trigger the attack without being detected by either the client or the server. {% endtab %}

{% endtabs %}