SSL / TLS Certificate Known Hard Coded Private Keys

high Nessus Plugin ID 121008

Synopsis

Known SSL / TLS private keys in use.

Description

The remote host is running a service that is using a publicly known SSL / TLS private key.
An attacker may use this key to decrypt intercepted traffic between users and the device.
A remote attacker can also perform a man-in-the-middle attack in order to gain access to the system or modify data in transit.

Solution

Where possible, change the X.509 certificates so that they are unique to the device or contact vendor for guidance.

See Also

http://www.nessus.org/u?48f09948

https://github.com/sec-consult/houseofkeys

https://www.kb.cert.org/vuls/id/566724/

Plugin Details

Severity: High

ID: 121008

File Name: ssl_hardcoded_keys.nasl

Version: 1.7

Type: remote

Family: Misc.

Published: 1/8/2019

Updated: 6/12/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2015-7255

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: SSL/Supported

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2015-6358, CVE-2015-7255, CVE-2015-7256, CVE-2015-7276, CVE-2015-8251