1 Reply Latest reply on Dec 21, 2017 4:53 PM by mesverrum

    Vulnerability solar wind

    jayshree vispute

      SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) affected on solar winds server


      Security Misconfiguration impacted


      Exploiting this vulnerabilities MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections


      SSL Multiple Vulnerabilities affected solarwinds application server vulnerability Weak Cryptography Synopsis It was noted that multiple SSL protocol related vulnerabilities are existing in the remote host. The remote host is vulnerable to one or multiple following SSL related issues.
      1. Medium and weak Strength Cipher Suites Supported
      2. 64-bit Block Size Cipher Suites Supported (SWEET32)
      3. Certificate Signed Using Weak Hashing Algorithm
      4. Self-Signed Certificate
      5. Version 2 and 3 Protocol Detection
      6. RC4 Cipher Suites Supported (Bar Mitzvah)
      7. Certificate weak RSA keys
      8. Certificate Expiry
      9.TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)
      10.TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam)
      11.TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)
      12. DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened encryption)


      the An attacker may be able to exploit this vulnerability and conduct a man-in-the-middle by decrypting Sensitive messages by recovery of the plaintext. Session can be downgraded to use
      EXPORT_RSA cipher suites. Decryption of TLS connection by utilizing previously captured traffic and weak cryptography.