Skip to main content
NetApp Knowledge Base

Host is Vulnerable to Extended Master Secret TLS Extension , reminiscent of CVE-2009-3555

Views:
1,050
Visibility:
Public
Votes:
3
Category:
ontap-9
Specialty:
core
Last Updated:

Applies to

ONTAP 9

Issue

Vulnerability Scanner reports the following:

Host is Vulnerable to Extended Master Secret TLS Extension (TLS triple handshake) Impact On successful exploitation it becomes vulnerable to a man-in-the-middle attack, where the attacker can simply forward messages back and forth between the client and server. Vendor Reference None CVE ID None Threat The Transport Layer Security (TLS) master secret is not cryptographically bound to important session parameters such as the server certificate. Consequently, it is possible for an active attacker to set up two sessions, one with a client and another with a server, such that the master secrets on the two sessions are the same. Note: this attacks are reminiscent of the renegotiation attacks of 2009 [Ray, Rex] (CVE-2009-3555). QID Detection Logic(Un-Authenticated): This QID checks for web response coming from vulnerable host. Note:Please refer Detection POC for more details of the detection logic Issue
Details Result: Host:x.x.x.x:443 is vulnerable to TLS triple handshake CVSS Details: Base: 2.6 Temporal: 2.1

 

CUSTOMER EXCLUSIVE CONTENT

Registered NetApp customers get unlimited access to our dynamic Knowledge Base.

New authoritative content is published and updated each day by our team of experts.

Current Customer or Partner?

Sign In for unlimited access

New to NetApp?

Learn more about our award-winning Support

 

 

  • Was this article helpful?