logo

133 Insecure encryption algorithm - Perfect Forward Secrecy


Description

The application uses cipher algorithms that expose all messages made during the communication if the current private key is compromised.


Impact

Obtain sensitive information that is being transmitted or has been stored.


Recommendation

Enable Perfect-Forward-Secrecy in the server side, by allowing Ciphersuites that contain DHE and ECDHE on its names.


Threat

Unauthorized attacker from adjacent network that has compromised a private key.


Expected Remediation Time

15 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: A
  • Attack complexity: H
  • Attack Requirements: N
  • Privileges required: N
  • User interaction: A
  • Confidentiality (VC): L
  • Integrity (VI): N
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: U

Requirements


Fixes


Last updated

2024/02/14