- CheckMates
- :
- Products
- :
- General Topics
- :
- Re: Vulnerability on our SMS
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Vulnerability on our SMS
We have scanned our SMS Server and found 2 vulnerablities. Can anyone suggest me how to fix them?
1. Weak Key Exchange (KEX) Algorithm(s) Supported (SSH)
The remote SSH server is configured to allow / support weak key exchange (KEX) algorithm(s).
Port 22/tcp
2. Weak Encryption Algorithm(s) Supported (SSH)
The remote SSH server is configured to allow / support weak encryption algorithm(s).
Port 22/tcp
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
See the resources posted in reply to this discussion amongst others:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
See the resources posted in reply to this discussion amongst others:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Which KEX and MAC were identified as weak by the scanner?
Jozko Mrkvicka
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@JozkoMrkvicka
For KEX
- Disable the reported weak KEX algorithm(s)
1024-bit MODP group / prime KEX algorithms:
Alternatively use elliptic-curve Diffie-Hellmann in general, e.g. Curve 25519.
2. For MAC
Disable the reported weak encryption algorithm(s).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I would say what @Chris_Atkinson gave is your solution. Btw, you can also run cipher_util from expert mode and see options available there.
Best,
Andy
