Secure channel communication between the Avi Controller and the Service Engine occurs on port 8443.
A vulnerability scan detects the use of the cipher suite ECDHE-RSA-AES256-SHA for this communication.
The vulnerability scanning tool flags this cipher as weak.
Port 8443 is used for internal management communication between the Avi Controller and the Service Engine.
This communication is handled by Envoy, which uses predefined, system-level cipher suites.
The cipher suite ECDHE-RSA-AES256-SHA is included in this internal cipher set and cannot be configured or removed through the UI or API.
As a result, vulnerability scanners detect and report this cipher during security scans.
Temporary Workaround
If the cipher must be removed to satisfy vulnerability scan requirements, follow the steps below:
Log in to the Controller using CLI.
Navigate to:
/var/lib/avi/envoy
Edit the file envoy_lds.yaml and remove the cipher:
ECDHE-RSA-AES256-SHA
Save the file and restart the Envoy service:
systemctl restart envoy.service
Permanent Resolution
A permanent fix to address the weak cipher will be provided in a future release.