logo

Database

Description

The application uses cipher algorithms that expose all messages made during the communication if the current private key is compromised.

Impact

Obtain sensitive information that is being transmitted or has been stored.

Recommendation

Enable Perfect-Forward-Secrecy in the server side, by allowing Ciphersuites that contain DHE and ECDHE on its names.

Threat

Unauthorized attacker from adjacent network that has compromised a private key.

Expected Remediation Time

⏱️ 15 minutes.