Aws Insecure Ssl Protocol
Description
Detects AWS Elastic Load Balancers (ELBv2) that are configured to use outdated and insecure SSL/TLS protocols (SSLv3, TLSv1, or TLSv1.1). These legacy protocols have known vulnerabilities and may expose the load balancer to security risks like POODLE and BEAST attacks.
Detection Strategy
• Scans all ELBv2 load balancers in the specified AWS region
• For each load balancer, examines all listeners that have SSL policies configured
• Checks if any SSL policy allows the insecure protocols: SSLv3, TLSv1, or TLSv1.1
• Reports a vulnerability if any listener's SSL policy includes one or more of these outdated protocols
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.