Certificates provide a more secure form of network authentication. These could be stealed for a malware for use communications fraud and data exfiltration, furthermore, non-existent or faulty validation of the access point certificate, allows attackers to obtain the challenge response values used in authentication. Attackers could use this data to bruteforce the password hash for the legitimate network.
- Falsify business services, corrupting the trust provided by a valid certificate, so that sensitive communications can be decrypted.
- Exploit for entry due to unsecured or lightly protected wireless access.
Install correct certificates on servers, revoke vulnerable ones and validate new keys and certificates are installed and working.
Authenticated attacker from the Internet.
⌚ 30 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
All services use secure configurations and protocols
Defaults:
policyProject: 'DefaultPolicies'
Policies:
MQEndpoint: 'MQEndpoint'
remoteDefaultQueueManager: '{MQClientPolicy}:MQEndpoint'
RestAdminListener:
requireClientCert: true
BrokerRegistry:
mqKeyRepository: /startup/ssl/keystore
ResourceManagers: JVM: jvmSystemProperty: '-Dcom.ibm.fxr.passfileenc=n'
Log:
consoleLog: true
outputFormat: 'ibmjson'
AdminLog:
enabled: true
consoleLog: true
Protocol:
tls: enabled
version: 1.2
A service is configured with poor security protocols, such as ssl
Defaults:
policyProject: 'DefaultPolicies'
Policies:
MQEndpoint: 'MQEndpoint'
remoteDefaultQueueManager: '{MQClientPolicy}:MQEndpoint'
RestAdminListener:
requireClientCert: false
BrokerRegistry:
mqKeyRepository: /startup/ssl/keystore
ResourceManagers: JVM: jvmSystemProperty: '-Dcom.ibm.fxr.passfileenc=n'
Log:
consoleLog: true
outputFormat: 'ibmjson'
AdminLog:
enabled: true
consoleLog: true
Protocol:
ssl: enabled