JCP REST and Websocket Processes vulnerable to Logjam attack
search cancel

JCP REST and Websocket Processes vulnerable to Logjam attack

book

Article ID: 250104

calendar_today

Updated On:

Products

CA Automic Workload Automation - Automation Engine CA Automic One Automation

Issue/Introduction

The Automation Engine JCP Websocket (8443) and JCP REST components are vulnerable to the Logjam attack outlined in CVE-2015-4000

Testssl.sh (open source tool) detected the following problem:

LOGJAM (CVE-2015-4000), experimental      VULNERABLE (NOT ok): common prime: RFC2409/Oakley Group 2 (1024 bits),
                                           but no DH EXPORT ciphers
 

 

 

 

Environment

Release : 21.0.3

Component : AUTOMATION ENGINE

Cause

Weak ciphers were not disabled.

Resolution

This has been resolved with release 21.0.4 which is available now from the Automic Download Center. 

The weak ciphers have been disabled.