Azure Insecure Port
Description
Detects Azure Redis Cache instances that have non-SSL port access enabled, allowing unencrypted connections. This configuration poses a security risk as it permits communication without TLS/SSL encryption, potentially exposing sensitive data in transit.
Detection Strategy
• Identifies all Redis Cache instances in the Azure subscription
• Checks if the non-SSL port is enabled on each Redis Cache instance
• Reports a vulnerability when a Redis Cache has enable_non_ssl_port set to true
• Best practice is to disable non-SSL ports and require encrypted connections only
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.