<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability scan show weak encryption ciphers and DH groups on VPN device in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120839#M22455</link>
    <description>&lt;P&gt;&lt;SPAN&gt;When the Check Point Gateway uses a Traditional Mode policy, the encryption suites defined are found in the Gateway properties, under the IPsec VPN tab.&amp;nbsp;&lt;/SPAN&gt;The IKE Properties are configured to set the encryption and hashing algorithms the Security Gateway will support if it is the &lt;STRONG&gt;responder&amp;nbsp;&lt;/STRONG&gt;(when the IKE negotiation is initiated by the peer).&lt;/P&gt;
&lt;P&gt;When the Security Gateway is the &lt;STRONG&gt;initiator&lt;/STRONG&gt;, it uses the strongest available encryption suite.When the Security Gateway initiates Phase 1, it will use the AES-256 encryption algorithm and the SHA-256 hashing algorithm.&lt;/P&gt;
&lt;P&gt;Details can be found in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk117438&amp;amp;partition=Basic&amp;amp;product=IPSec" target="_self"&gt;&lt;SPAN&gt;sk117438&amp;nbsp;How to know which VPN encryption suites a Check Point Gateway will offer in Phase 1 and 2 when using the Traditional Mode VPN policy&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jun 2021 13:05:53 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2021-06-10T13:05:53Z</dc:date>
    <item>
      <title>Vulnerability scan show weak encryption ciphers and DH groups on VPN device</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120828#M22450</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;Vulnerability scan has detected the below two vulnerabilities on port 500&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Weak Encryption Ciphers identified on VPN Device&lt;/LI&gt;&lt;LI&gt;Weak Diffie-Hellman groups identified on VPN Device&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;are these vulnerabilities detected because these encryption ciphers&amp;nbsp; and DH groups are being used in different VPN communities .&lt;/P&gt;&lt;P&gt;Should this&amp;nbsp; been detected ? as the scan is run on the gateway IP .&lt;/P&gt;&lt;P&gt;How this can be mitigated ? Can we disable weak ciphers?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sijeel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 12:10:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120828#M22450</guid>
      <dc:creator>Malik1</dc:creator>
      <dc:date>2021-06-10T12:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan show weak encryption ciphers and DH groups on VPN device</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120829#M22451</link>
      <description>&lt;P&gt;Are you sure the detection was on UDP port 500 and not involving TLS on some other port such as 443?&amp;nbsp; What was the weak cipher?&amp;nbsp; 3DES?&amp;nbsp; Read through these SKs and see if they apply to your situation:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk113114&amp;amp;partition=Basic&amp;amp;product=IPSec" target="_blank"&gt;sk113114: Check Point response to CVE-2016-2183 (Sweet32)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100647&amp;amp;partition=Basic&amp;amp;product=All" target="_blank"&gt;sk100647: Check Point response to common false positives scanning results&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120774&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;sk120774: Vulnerability scan shows that there are &lt;STRONG&gt;weak&lt;/STRONG&gt; ciphers related to TLS 1.2&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 12:20:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120829#M22451</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-06-10T12:20:37Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan show weak encryption ciphers and DH groups on VPN device</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120833#M22452</link>
      <description>&lt;P&gt;You beat me to it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 12:35:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120833#M22452</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-06-10T12:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan show weak encryption ciphers and DH groups on VPN device</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120837#M22453</link>
      <description>&lt;P&gt;Hi Tim and Val&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below was the evidence shared that was shared by the team and yes its a vulnerability on port 500&lt;/P&gt;&lt;P&gt;Weak encryption ciphers&lt;/P&gt;&lt;P&gt;Transform Set:: Mode: Main, Encryption: 3DES, Hash type: SHA, Auth method: pre-shared key, DH Group: Group 2&lt;BR /&gt;Transform Set:: Mode: Main, Encryption: 3DES, Hash type: SHA, Auth method: RSA signatures, DH Group: Group 2&lt;BR /&gt;Transform Set:: Mode: Main, Encryption: 3DES, Hash type: SHA, Auth method: Checkpoint Hybrid, DH Group: Group 2&lt;/P&gt;&lt;P&gt;Weak DH groups&lt;/P&gt;&lt;P&gt;Transform Set:: Mode: Main, Encryption: AES, Key Length: 256, Hash type: SHA, Auth method: pre-shared key, DH Group: Group 2,&lt;BR /&gt;Transform Set:: Mode: Main, Encryption: AES, Key Length: 256, Hash type: MD5, Auth method: RSA signatures, DH Group: Group 2,&lt;BR /&gt;Transform Set:: Mode: Main, Encryption: AES, Key Length: 256, Hash type: SHA, Auth method: Checkpoint Hybrid, DH Group: Group 2,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We were using traditional vpn previously and&amp;nbsp; under the traditional vpn configuration&amp;nbsp;most of the encryption ciphers (3des,des,aes128,aes256,cast) and hash(md5,sha1 and sha256) are enabled. Only DH group 2 is enabled in config.The configuration is still present&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 12:52:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120837#M22453</guid>
      <dc:creator>Malik1</dc:creator>
      <dc:date>2021-06-10T12:52:25Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan show weak encryption ciphers and DH groups on VPN device</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120838#M22454</link>
      <description>&lt;P&gt;Did you use those&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;ciphers&amp;nbsp; and DH groups in the VPN communities? I remember on some documents from vendors the screenshot instruct user to use weak cipher for compatibility reasons (?), or just old document. So it was using the weak cipher during initial setup. We had to review them and change the setting at one point.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 12:57:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120838#M22454</guid>
      <dc:creator>Cyber_Serge</dc:creator>
      <dc:date>2021-06-10T12:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan show weak encryption ciphers and DH groups on VPN device</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120839#M22455</link>
      <description>&lt;P&gt;&lt;SPAN&gt;When the Check Point Gateway uses a Traditional Mode policy, the encryption suites defined are found in the Gateway properties, under the IPsec VPN tab.&amp;nbsp;&lt;/SPAN&gt;The IKE Properties are configured to set the encryption and hashing algorithms the Security Gateway will support if it is the &lt;STRONG&gt;responder&amp;nbsp;&lt;/STRONG&gt;(when the IKE negotiation is initiated by the peer).&lt;/P&gt;
&lt;P&gt;When the Security Gateway is the &lt;STRONG&gt;initiator&lt;/STRONG&gt;, it uses the strongest available encryption suite.When the Security Gateway initiates Phase 1, it will use the AES-256 encryption algorithm and the SHA-256 hashing algorithm.&lt;/P&gt;
&lt;P&gt;Details can be found in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk117438&amp;amp;partition=Basic&amp;amp;product=IPSec" target="_self"&gt;&lt;SPAN&gt;sk117438&amp;nbsp;How to know which VPN encryption suites a Check Point Gateway will offer in Phase 1 and 2 when using the Traditional Mode VPN policy&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 13:05:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120839#M22455</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-06-10T13:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan show weak encryption ciphers and DH groups on VPN device</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120841#M22456</link>
      <description>&lt;P&gt;OK that makes sense, with the Traditional VPN setup in the Encrypt Action properties you would select multiple encryption/hashing/DH groups that would be acceptable.&amp;nbsp; This must be what the scanning tool is picking up. When simplified VPNs were introduced in R52, the VPN settings were moved out of the rulebase and into the VPN Community objects, which would only let you set one&amp;nbsp;encryption/hashing/DH group for all tunnels of that community.&lt;/P&gt;
&lt;P&gt;So what you will need to do is edit all the Encrypt Actions of your VPN rules and deselect the weak ciphers.&amp;nbsp; As long as all firewalls utilizing those rules are yours (i.e. managed by the same SMS or CMA) making this change should be safe as long as you reinstall policy to all participant gateways immediately.&amp;nbsp; However if there are any externally managed gateways or interoperable devices utilizing these rules being edited, LOOK OUT as deselecting a protocol that the VPN peer is intending to use can most definitely break the tunnel.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once all weak ciphers are deselected from all Encrypt actions they should stop being offered by the firewall and the scan should pass.&amp;nbsp; Also look in the Global Properties under VPN and its sub-screens, if you have Traditional Mode active there may be some other settings there that you'll need to adjust to disable the weak ciphers, can't quite remember.&amp;nbsp; &lt;STRONG&gt;Edit: After reading Gunter's post these settings are on the gateway object, not Global Properties.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;See this SK for some helpful instructions and screenshots:&amp;nbsp;&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk117438&amp;amp;partition=Basic&amp;amp;product=IPSec" target="_blank" rel="noopener" data-hasqtip="59" aria-describedby="qtip-59"&gt;sk117438: How to know which &lt;STRONG&gt;VPN&lt;/STRONG&gt; encryption suites a Check Point Gateway will offer in Phase 1 and 2 when using the &lt;STRONG&gt;Traditional&lt;/STRONG&gt; &lt;STRONG&gt;Mode&lt;/STRONG&gt; &lt;STRONG&gt;VPN&lt;/STRONG&gt; policy&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 15:11:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120841#M22456</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-06-10T15:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan show weak encryption ciphers and DH groups on VPN device</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120855#M22460</link>
      <description>&lt;P&gt;To add what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp; mentioned already, why don't you just disable those weak cyphers? Also, why are you still running unsupported config? Traditional VPN is long gone, or should, in you case.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 14:08:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120855#M22460</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-06-10T14:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan show weak encryption ciphers and DH groups on VPN device</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120859#M22462</link>
      <description>&lt;P&gt;we have already migrated to simplified mode. but the old policy packages that have the encrypt action and the traditional vpn configuration under the gateway object is still present. That hasnt been removed .From the suggestion shared by&amp;nbsp; &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;i can remove the encrypt action from the old policy package as they aren't being used&amp;nbsp; and uncheck all the cipher under the traditional vpn configuration in gateway object . That should fix the issue.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 15:36:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120859#M22462</guid>
      <dc:creator>Malik1</dc:creator>
      <dc:date>2021-06-10T15:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan show weak encryption ciphers and DH groups on VPN device</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120860#M22463</link>
      <description>&lt;P&gt;Also to add .As we are only be using simplified vpn mode that uses communities , we should not face the vulnerability in future .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 15:36:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-scan-show-weak-encryption-ciphers-and-DH-groups-on/m-p/120860#M22463</guid>
      <dc:creator>Malik1</dc:creator>
      <dc:date>2021-06-10T15:36:52Z</dc:date>
    </item>
  </channel>
</rss>

