2.4 Do Not Use Default or Shared Cryptographic Material

Information

If an attacker gains access to shared cryptographic material, including default material, the attacker can reuse that material to impersonate the MySQL server or otherwise compromise its operations.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Generate new certificates, keys, and other cryptographic material as needed for each affected MySQL instance.

See Also

https://workbench.cisecurity.org/files/1619