Running CA Access Gateway (SPS), Web Agent, and AdminUI, the following vulnerabilities are reported:
Deprecated SSH Cryptographic SettingsHTTP Security Header Not DetectedHTTP TRACE / TRACK Methods EnabledSHA1 deprecated setting for SSHTCP Sequence Number Approximation Based Denial of ServiceWeb Directories Listable VulnerabilityWeb Server HTTP Trace/Track Method Support Cross-Site Tracing VulnerabilityWeb Server Uses Plain-Text Form Based AuthenticationEOL/Obsolete Software: Node.js 10.x DetectedRemote Management Service Accepting Unencrypted Credentials Detected(HTTP)Spring Framework Denial of Service (DoS) Data Binding VulnerabilitySpring Framework Denial of Service (DoS) VulnerabilitySpring Framework Path Traversal VulnerabilityWeb Server Uses Plain Text Basic AuthenticationWorld-Writable Directories Should Have Their Sticky Bits SetBirthday attacks against TLS ciphers with 64bit block size vulnerability (Sweet32)Secure Sockets Layer/Transport Layer Security (SSL/TLS) Server supports Transport Layer Security (TLSv1.0)Secure Sockets Layer/Transport Layer Security (SSL/TLS) Server Supports Transport Layer Security (TLSv1.1)SSL Certificate - ExpiredSSL Certificate - Signature Verification Failed VulnerabilitySSL Server Allows Anonymous Authentication Vulnerability
These are OS related only, get in touch with the System Administrator and the OS provider to fix them.
Deprecated SSH Cryptographic SettingsSHA1 deprecated setting for SSHTCP Sequence Number Approximation Based Denial of Service
SiteMinder doesn't have a direct and specific configuration to implement (1)(2).
These can be turned off (3).
Configuration modification will solve it (4).
Disable the HTTP port (5)(6).
Set the sticky bit to the folders (7).
This is related to the CVE-2016-2183, for which you can disable the DES ciphers from the CA Access Gateway (SPS) configuration in server.conf, where the values of "ciphers" and "fipsciphers" can be customized.
Also, modify the SSLCipherSuite from the httpd-ssl.conf file under httpd/conf/extra of CA Access Gateway (SPS);
Change the protocols (8)(9).
Renew the certificates, and ensure these are signed by a known "third-party Certificate Authority" (10)(11).
Disable the "Anonymous Diffie-Hellman (ADH) ciphers" from the CA Access Gateway (SPS) configuration server.conf, where the values of "ciphers" and "fipsciphers" can be customized.
Also, you can modify the SSLCipherSuite from the httpd-ssl.conf file under httpd/conf/extra of CA Access Gateway (SPS);
In AdminUI, this can be done in the file standalone-full.xml, in the property "enabled-cipher-suites".