SSL/TLS Diffie-Hellman Modulus Vulnerability
search cancel

SSL/TLS Diffie-Hellman Modulus Vulnerability

book

Article ID: 276512

calendar_today

Updated On:

Products

CA API Gateway

Issue/Introduction

SSL/TLS Diffie-Hellman Modulus Vulnerability defected on API Gateway server listen ports.

Environment

API Gateway Supported versions.

Resolution

The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount of time (depending on modulus size and attacker resources). This may allow an attacker to recover the plaintext or potentially violate the integrity of connections.

Additional Information

Go to Policy Manager > Tasks > Transport > Manage Listen Ports > Listen Port Properties > SSL/TLS Settings tab and uncheck the following cipher suites under Enabled Cipher Suites.

Port 8443 and 9443 and 2124:

TLS_DHE_RSA_WITH_AES_128_CBC_SHA

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

TLS_DHE_RSA_WITH_AES_128_CBC_SHA