|
Post by beedsley on Aug 30, 2016 17:55:38 GMT
We NAT a few ports to individual windows machines for RDP access to each of them, a PCI scan detected those and return with 2 FAILED results for ports 5100 and 5001.
Are these false positives or is there something we can do to move from a FAIL to a PASS on these ports?
X.X.X.X:5100/tcp
SSL/TLS server supports RC4 ciphers
CVE-2015-2808 4.3 Medium FAIL
-The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
X.X.X.X:5100/tcp
SSL/TLS server supports RC4 ciphers
CVE-2013-2566 4.3 Medium FAIL
-The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.
Running: 1.8.4b11
|
|
|
Post by Lee Sharp on Aug 30, 2016 20:00:13 GMT
What you are showing there is the encryption on whatever you are pointing those ports to. Updating them would fix the issue.
|
|