Vulnerability & Exploit Database

Back to search

TLS/SSL Server is enabling the POODLE attack

Severity CVSS Published Added Modified
4 (AV:N/AC:M/Au:N/C:P/I:N/A:N) October 14, 2014 February 23, 2016 February 22, 2018

Available Exploits 

Description

All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable to POODLE (Padding Oracle On Downgraded Legacy Encryption) attacks. The SSL 3.0 vulnerability stems from the way blocks of data are encrypted under a specific type of encryption algorithm within the SSL protocol. The POODLE attack takes advantage of the protocol version negotiation feature built into SSL to force the use of SSL 3.0 and then leverages this new vulnerability to decrypt select content within the SSL session.

The Payment Card Industry (PCI) Data Security Standard requires a minimum of TLS v1.1 and recommends TLS v1.2. In addition, FIPS 140-2 standard also requires a minimum of TLS v1.1 and recommends TLS v1.2.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial

References

Solution

ssl-disable-insecure-protocols

Related Vulnerabilities