Knowledge Search


×
 

SSL Web Management is Accepting Weak Ciphers

  [JSA10464] Show Article Properties


Legacy Advisory Id:
PSN-2011-01-147
Product Affected:
This is an issue which affects all versions of Junos with J-Web enabled. Routers with J-Web disabled, either explicitly or by default, are not vulnerable to this issue.
Problem:

J-Web allows the negotiation of SSL ciphers that offer weak encryption (below 128-bit). Two examples are RC4_40 and RC4_56. This can cause some PCI Compliance Scans to fail.
Solution:

Low-bit ciphers are now disabled so that the web server only accepts ciphers >=128 bits. "SSLCipherSuite -LOW" has been added to the httpd.conf configuration file during startup.

All Junos software releases built on or after 2010-11-05 have resolved this issue. Releases containing the change specifically include: 9.3S16.1, 10.0S10.1, 10.1R4, 10.2R3, 10.3R2, 10.4R1, and all subsequent releases (i.e. all releases built after 10.4R1).

This issue is being tracked as PR 539477. While this PR may not be viewable by customers, it can be used as a reference when discussing the issue with JTAC.

KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.

Workaround:
Configure the SSL client (web browser) to prefer strong encryption. Note that this will not necessarily allow PCI compliance scanners to pass, but will mitigate the risk of using a weak cipher.
Implementation:

How to obtain fixed software:

Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request.
Related Links:
CVSS Score:
5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Risk Level:
Medium
Risk Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."