Autosys Vulnerability - Weak SSL/TLS Key Exchange
search cancel

Autosys Vulnerability - Weak SSL/TLS Key Exchange

book

Article ID: 253612

calendar_today

Updated On:

Products

Autosys Workload Automation

Issue/Introduction

Qualys reports vulnerability with the  Autosys scheduler and WCC components. 

example

PROTOCOL CIPHER NAME GROUP KEY-SIZE FORWARD-SECRET CLASSICAL-STRENGTH QUANTUM-STRENGTH
TLSv1 AES128-SHA RSA   1024 no 80 low
TLSv1 DHE-RSA-AES128-SHA DHE   1024 yes 80 low
TLSv1.1 AES128-SHA RSA   1024 no 80 low
TLSv1.1 DHE-RSA-AES128-SHA DHE   1024 yes 80 low
TLSv1.2 AES128-SHA RSA   1024 no 80 low
TLSv1.2 DHE-RSA-AES128-SHA DHE   1024 yes 80 low

Environment

Release : All Supported Versions

Resolution

Below are steps to configure the various components that use SSL for TLS 1.2 and also disabling weak ciphers where applicable. 

This link shows how to configure the AutoSys RESTful Web Server (port 9443) to use TLS 1.2...


https://techdocs.broadcom.com/us/en/ca-enterprise-software/intelligent-automation/autosys-workload-automation/12-1/installing/post-installation-procedures-for-the-server/change-the-web-server-ssl-protocol-to-tlsv1-2.html

This link provides steps for configuring WCC and EEM to use TLS 1.2 and disabling weak ciphers for EEM.
NOTE: For the EEM portion of this document, you will need to check your EEM version first. If it is still 12.51, TLS 1.2 is not supported with that version. You would first need to upgrade EEM to 12.6

https://knowledge.broadcom.com/external/article?articleId=74517

This link provides steps for disabling weak ciphers for WCC.

https://techdocs.broadcom.com/us/en/ca-enterprise-software/intelligent-automation/autosys-workload-automation/12-1/administrating/ca-wcc-administration/customize-secure-access-to-ca-wcc.html#concept.dita_5a5bd31150c07cbb8a842bf5747534553288eb49_DisableWeakCiphersinSSLMode