Applying 15 Affecting 3: Top 25 Remediations by Risk
Applying 15 Affecting 3: Top 25 Remediations by Risk
Will Remediate
Applying Affecting
15 96.3% 100% 3
Vulnerabilities Risk
Remediations Assets
published available
100% exploits 0% malware kits
1 of 16
1. Disable insecure TLS/SSL protocol support
Remediation Steps
Configure the server to require clients to use TLS version 1.2 using Authenticated Encryption with Associated Data (AEAD)
capable ciphers.
Assets
Name IP Address Site
addr.arpa 12.49.178.193 basham
Unknown 12.49.178.193 basham
2 of 16
2. Disable SSLv2, SSLv3, and TLS 1.0. The best solution is to only have TLS 1.2 enabled
Remediation Steps
There is no server-side mitigation available against the BEAST attack. The only option is to disable the affected protocols (SSLv3
and TLS 1.0). The only fully safe configuration is to use Authenticated Encryption with Associated Data (AEAD), e.g. AES-GCM,
AES-CCM in TLS 1.2.
Assets
Name IP Address Site
in-addr.arpa 12.49.178.193
Unknown 12.49.178.193 uk
3 of 16
3. Disable TLS/SSL support for 3DES cipher suite
Remediation Steps
Configure the server to disable support for 3DES suite.
For Microsoft IIS web servers, see Microsoft Knowledgebase article 245030 for instructions on disabling 3DES cipher suite.
The following recommended configuration provides a higher level of security. This configuration is compatible with Firefox 27,
Chrome 22, IE 11, Opera 14 and Safari 7. SSLv2, SSLv3, and TLSv1 protocols are not recommended in this configuration.
Instead, use TLSv1.1 and TLSv1.2 protocols.
Refer to your server vendor documentation to apply the recommended cipher configuration:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-
ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-
RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-
RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-
AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-
SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
Assets
Name IP Address Site
.in-addr.arpa 12.49.178.193
Unknown 12.49.178.193
4 of 16
4. Fix the subject's Common Name (CN) field in the certificate
Remediation Steps
The subject's common name (CN) field in the X.509 certificate should be fixed to reflect the name of the entity presenting the
certificate (e.g., the hostname). This is done by generating a new certificate usually signed by a Certification Authority (CA)
trusted by both the client and server.
Assets
Name IP Address Site
.in-addr.arpa 12.49.178.193
5 of 16
5. Obtain a new certificate from your CA and ensure the server configuration is correct
Remediation Steps
Ensure the common name (CN) reflects the name of the entity presenting the certificate (e.g., the hostname). If the certificate(s)
or any of the chain certificate(s) have expired or been revoked, obtain a new certificate from your Certificate Authority (CA) by
following their documentation. If a self-signed certificate is being used, consider obtaining a signed certificate from a CA.
References: Mozilla: Connection Untrusted Error SSLShopper: SSL Certificate Not Trusted Error Windows/IIS certificate chain
config Apache SSL config Nginx SSL config CertificateChain.io
Assets
Name IP Address Site
.in-addr.arpa 12.49.178.193
6 of 16
6. Disable TLS/SSL support for static key cipher suites
Remediation Steps
Configure the server to disable support for static key cipher suites.
For Microsoft IIS web servers, see Microsoft Knowledgebase article 245030 for instructions on disabling static key cipher suites.
The following recommended configuration provides a higher level of security. This configuration is compatible with Firefox 27,
Chrome 22, IE 11, Opera 14 and Safari 7. SSLv2, SSLv3, and TLSv1 protocols are not recommended in this configuration.
Instead, use TLSv1.1 and TLSv1.2 protocols.
Refer to your server vendor documentation to apply the recommended cipher configuration:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-
ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-
RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-
RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-
AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-
SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
Assets
Name IP Address Site
93.78.149.201.in-addr.arpa 201.149.78.93 basham
Unknown 201.149.78.90 basham
7 of 16
7. Use a Stronger Key
Remediation Steps
If the weak key is used in an X.509 certificate (for example for an HTTPS server), generate a longer key and recreate the
certificate.
Please also refer to NIST's recommendations on cryptographic algorithms and key lengths.
Assets
Name IP Address Site
93.78.149.201.in-addr.arpa 201.149.78.93 basham
8 of 16
8. Restrict Query Access on Caching Nameservers
Remediation Steps
Restrict the processing of DNS queries to only systems that should be allowed to use this nameserver.
Assets
Name IP Address Site
93.78.149.201.in-addr.arpa 201.149.78.93 basham
9 of 16
9. Disable TLS/SSL support for RC4 ciphers
Remediation Steps
Configure the server to disable support for RC4 ciphers.
For Microsoft IIS web servers, see Microsoft Knowledgebase article 245030 for instructions on disabling rc4 ciphers.
The following recommended configuration provides a higher level of security. This configuration is compatible with Firefox 27,
Chrome 22, IE 11, Opera 14 and Safari 7. SSLv2, SSLv3, and TLSv1 protocols are not recommended in this configuration.
Instead, use TLSv1.1 and TLSv1.2 protocols.
Refer to your server vendor documentation to apply the recommended cipher configuration:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-
ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-
RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-
RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-
AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-
SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
Assets
Name IP Address Site
Unknown 201.149.78.90 basham
10 of 16
10. Stop Using SHA-1
Remediation Steps
Stop using signature algorithms relying on SHA-1, such as "SHA1withRSA", when signing X.509 certificates. Instead, use the
SHA-2 family (SHA-224, SHA-256, SHA-384, and SHA-512).
Assets
Name IP Address Site
93.78.149.201.in-addr.arpa 201.149.78.93 basham
11 of 16
11. Restrict Processing of Recursive Queries
Remediation Steps
Restrict the processing of recursive queries to only systems that should be allowed to use this nameserver.
Assets
Name IP Address Site
93.78.149.201.in-addr.arpa 201.149.78.93 basham
12 of 16
12. Generate random Diffie-Hellman parameters
Remediation Steps
Configure the server to use a randomly generated Diffie-Hellman group. It's recommend that you generate a 2048-bit group. The
simplest way of generating a new group is to use OpenSSL:
openssl dhparam -out dhparams.pem 2048
To use the DH parameters in newer versions of Apache (2.4.8 and newer) and OpenSSL 1.0.2 or later, you can directly specify
your DH params file as follows:
SSLOpenSSLConfCmd DHParameters "{path to dhparams.pem}"
If you are using Apache with LibreSSL, or Apache 2.4.7 and OpenSSL 0.9.8a or later, you can append the DHparams you
generated earlier to the end of your certificate file and reload the configuration.
For other products see the remediation steps suggested by the original researchers.
Assets
Name IP Address Site
Unknown 201.149.78.90 basham
13 of 16
13. Use a Stronger Diffie-Hellman Group
Remediation Steps
Please refer to this guide to deploying Diffie-Hellman for TLS for instructions on how to configure the server to use 2048-bit or
stronger Diffie-Hellman groups with safe primes.
Assets
Name IP Address Site
Unknown 201.149.78.90 basham
14 of 16
14. Disable TCP timestamp responses on Linux
Remediation Steps
Set the value of net.ipv4.tcp_timestamps to 0 by running the following command:
sysctl -w net.ipv4.tcp_timestamps=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
net.ipv4.tcp_timestamps=0
Assets
Name IP Address Site
Unknown 201.149.78.85 basham
15 of 16
15. Enable TLS/SSL support for strong ciphers
Remediation Steps
Enable support for at least one of the ciphers listed below:
• TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
• TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
• TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
• TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
• TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
• TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
• TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
• TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Assets
Name IP Address Site
93.78.149.201.in-addr.arpa 201.149.78.93 basham
Unknown 201.149.78.90 basham
16 of 16