Vulnerability for Port 6300 with Automation Point

book

Article ID: 223033

calendar_today

Updated On:

Products

CA Automation Point

Issue/Introduction

Starting to upgrade to Automation Point from an earlier release to release 11.7, there could be a security vulnerability test which highlighted some vulnerabilities. 

Port

Name

Synopsis

6300

SSL Weak Cipher Suites Supported

The remote service supports the use of weak SSL ciphers.

6300

SSL Anonymous Cipher Suites Supported

The remote service supports the use of anonymous SSL ciphers.

6300

SSL Medium Strength Cipher Suites Supported (SWEET32)

The remote service supports the use of medium strength SSL ciphers.

6300

SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam)

The remote host supports a set of weak ciphers.

6300

TLS Version 1.0 Protocol Detection

The remote service encrypts traffic using an older version of TLS.

Environment

Release : 11.7

Component : CA Automation Point

Resolution

Automation Point  11.7 doesn't use ports 6200, 6205 and 6300 anymore.
The service that was using port 6300 (i.e. WebMV  or Web Message Viewer) is completely removed from the product at 11.7 and replaced by the new Console Manager service.

Additional Information

The WebMV, Web Message Viewer of Automation Point releases up to and including 11.6 were using ports :

6200    Unicenter Automation Point - WebMV                               : Changed via CA AP Config Mngr, Expert, Automation, Web Msg Viewer, Advanced

6205    Unicenter Automation Point - WebMV                               : Changed via CA AP Config Mngr, Expert, Automation, Web Msg Viewer, Advanced

6300    Unicenter Automation Point - WebMV                               : Changed via CA AP Config Mngr, Expert, Automation, Web Msg Viewer, Advanced