1 Reply Latest reply on Dec 21, 2018 5:28 AM by a.p.

    IN ESXI 5.5 how to Disable the ssl 2 and 3 and how to enable 1.2.

    lohithuc Lurker

      We have found the Vulnerability in ESXi 5.5 server. below are the details.

       

      The remote service accepts connections encrypted using SSL 2.0 and/or

      SSL 3.0. These versions of SSL are affected by several cryptographic

      flaws, including:

       

        - An insecure padding scheme with CBC ciphers.

       

        - Insecure session renegotiation and resumption schemes.

       

      An attacker can exploit these flaws to conduct man-in-the-middle

      attacks or to decrypt communications between the affected service and

      clients.

       

      Although SSL/TLS has a secure means for choosing the highest supported

      version of the protocol (so that these versions will be used only if

      the client or server support nothing better), many web browsers

      implement this in an unsafe way that allows an attacker to downgrade

      a connection (such as in POODLE). Therefore, it is recommended that

      these protocols be disabled entirely.

       

      NIST has determined that SSL 3.0 is no longer acceptable for secure

      communications. As of the date of enforcement found in PCI DSS v3.1,

      any version of SSL will not meet the PCI SSC's definition of 'strong

      cryptography'.