Tenable vulnerability for HCX - HSTS
search cancel

Tenable vulnerability for HCX - HSTS

book

Article ID: 387234

calendar_today

Updated On:

Products

VMware HCX

Issue/Introduction

The customer has a Tenable vulnerability scanner that is generating an alert that the HCX Manager web server (port 443) is not enforcing HSTS

The remote web server is not enforcing HSTS, as defined by RFC 6797. HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.

Cause

Tenable is querying "https://<hcx-ip>” which is not returning STS header since it is 302 redirect. None of the security headers are added for 302 re-direct 

Resolution

This has been fixed by adding `always` in the config file to the below line in /opt/vmware/config/apache-http/hcx-virtual-hosts.conf

 

Below is an example of the line before modification:

Header set Strict-Transport-Security "max-age=31536000 ; includeSubDomains"

And After:

Header always set Strict-Transport-Security "max-age=31536000 ; includeSubDomains"

Additional Information

None. There is no security impact