Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
287 |
H28-MOJ-Online-Nara-5-Seg-2-20161126-Endo_mq01q9.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
163.49.22.129 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
288 |
H28-MOJ-Online-Nara-5-Seg-2-20161126-Endo_mq01q9.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
163.49.22.129 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
289 |
H28-MOJ-Online-Nara-5-Seg-2-20161126-Endo_mq01q9.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
163.49.22.129 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
501 |
H28-MOJ-Online-Nara-5-Seg-3-20161126-Endo_6uyjrf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
163.49.22.130 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
502 |
H28-MOJ-Online-Nara-5-Seg-3-20161126-Endo_6uyjrf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
163.49.22.130 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
503 |
H28-MOJ-Online-Nara-5-Seg-3-20161126-Endo_6uyjrf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
163.49.22.130 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
778 |
H28-MOJ-Online-Nara-7-Seg-1-20161126-Endo_nm0xzd.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.128.1 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
779 |
H28-MOJ-Online-Nara-7-Seg-1-20161126-Endo_nm0xzd.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.128.1 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
780 |
H28-MOJ-Online-Nara-7-Seg-1-20161126-Endo_nm0xzd.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.128.1 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1001 |
H28-MOJ-Online-Nara-7-Seg-2-20161126-Endo_2kfbtq.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.128.2 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1002 |
H28-MOJ-Online-Nara-7-Seg-2-20161126-Endo_2kfbtq.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.128.2 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1003 |
H28-MOJ-Online-Nara-7-Seg-2-20161126-Endo_2kfbtq.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.128.2 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1206 |
H28-MOJ-Online-Nara-8-Seg-1-20161126-Endo_qrnvlr.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.129.150 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1424 |
H28-MOJ-Online-Nara-8-Seg-2-20161126-Endo_j3uns1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.129.34 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1620 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.129.33 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1621 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.129.33 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1622 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.129.33 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1623 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.129.33 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1624 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.129.33 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1821 |
H28-MOJ-Online-Nara-9-Seg-1-20161126-Endo_ilvrp0.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.130.5 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1822 |
H28-MOJ-Online-Nara-9-Seg-1-20161126-Endo_ilvrp0.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.130.5 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
1823 |
H28-MOJ-Online-Nara-9-Seg-1-20161126-Endo_ilvrp0.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.130.5 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2050 |
H28-MOJ-Online-Nara-9-Seg-2-20161126-Endo_ogdo2c.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.130.6 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2051 |
H28-MOJ-Online-Nara-9-Seg-2-20161126-Endo_ogdo2c.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.130.6 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2052 |
H28-MOJ-Online-Nara-9-Seg-2-20161126-Endo_ogdo2c.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.130.6 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2431 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.45 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2432 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.45 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2433 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.45 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2434 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.45 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2435 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.45 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2672 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.57 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2673 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.57 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2674 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.57 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2675 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.57 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2676 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.57 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2918 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.9 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2919 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.9 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2920 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.9 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2921 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.9 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
2922 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.9 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3163 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.10 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3164 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.10 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3165 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.10 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3166 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.10 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3167 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.10 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3403 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.46 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3404 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.46 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3405 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.46 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3406 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.46 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3407 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.46 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3645 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.58 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3646 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.58 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3647 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.58 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3648 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.58 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3649 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.58 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3891 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.11 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3892 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.11 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3893 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.11 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3894 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.11 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
3895 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.132.11 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4066 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.100 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4067 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.100 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4068 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.100 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4069 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.100 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4239 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.128 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4240 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.128 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4241 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.128 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4242 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.128 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4430 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.130 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4431 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.130 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4432 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.130 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4433 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.130 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4601 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.25 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4602 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.25 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4603 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.25 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4604 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.25 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4771 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.26 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4772 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.26 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4773 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.26 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
4774 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.133.26 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5093 |
H28-MOJ-Online-Nara-13-Seg-1-20161126-Endo_9whfs5.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.134.53 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5094 |
H28-MOJ-Online-Nara-13-Seg-1-20161126-Endo_9whfs5.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.134.53 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5095 |
H28-MOJ-Online-Nara-13-Seg-1-20161126-Endo_9whfs5.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.134.53 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5312 |
H28-MOJ-Online-Nara-13-Seg-2-20161126-Endo_0pcahr.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.134.54 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5313 |
H28-MOJ-Online-Nara-13-Seg-2-20161126-Endo_0pcahr.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.134.54 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5314 |
H28-MOJ-Online-Nara-13-Seg-2-20161126-Endo_0pcahr.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.134.54 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5545 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.100 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5686 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.129 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5687 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.129 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5823 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.150 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
5824 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.150 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
6207 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.25 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
6208 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.25 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
6400 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.41 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
6573 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.45 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
6723 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.53 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
6896 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.57 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
7075 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.61 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
7258 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.63 |
tcp |
9855 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
7259 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.63 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
7471 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.65 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
8233 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.9 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
8427 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.10 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
8606 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.11 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
8741 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.131 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
8742 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.131 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
9045 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.26 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
9046 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.26 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
9202 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.42 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
9375 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.46 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
9524 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.54 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
9699 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.58 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
9857 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.137.62 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
9981 |
H28-MOJ-Online-Nara-17-seg-1-20161126-soga_nryyhs.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.138.1 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
10283 |
H28-MOJ-Online-Nara-17-seg-1-20161126-soga_nryyhs.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.138.37 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
10401 |
H28-MOJ-Online-Nara-17-seg-2-20161126-soga_ng4omz.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.138.2 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
10590 |
H28-MOJ-Online-Nara-17-seg-2-20161126-soga_ng4omz.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.138.38 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
10785 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.151 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
10786 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.151 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
10787 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.151 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
10788 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.151 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
10789 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.151 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
11119 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.33 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
11120 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.33 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
11121 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.33 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
11122 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.33 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
11123 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.33 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
11255 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.5 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
11468 |
H28-MOJ-Online-Nara-18-seg-2-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.34 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
11469 |
H28-MOJ-Online-Nara-18-seg-2-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.34 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
11470 |
H28-MOJ-Online-Nara-18-seg-2-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.34 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
11597 |
H28-MOJ-Online-Nara-18-seg-2-20161126-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.139.6 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
13698 |
H28-MOJ-Online-Nara-23-seg-1-20161126-soga_0xbhqy.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.25 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
13699 |
H28-MOJ-Online-Nara-23-seg-1-20161126-soga_0xbhqy.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.25 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
13700 |
H28-MOJ-Online-Nara-23-seg-1-20161126-soga_0xbhqy.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.25 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
13701 |
H28-MOJ-Online-Nara-23-seg-1-20161126-soga_0xbhqy.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.25 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
13871 |
H28-MOJ-Online-Nara-23-seg-2-20161126-soga_qe2r2h.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.26 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
13872 |
H28-MOJ-Online-Nara-23-seg-2-20161126-soga_qe2r2h.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.26 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
13873 |
H28-MOJ-Online-Nara-23-seg-2-20161126-soga_qe2r2h.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.26 |
tcp |
6547 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
13874 |
H28-MOJ-Online-Nara-23-seg-2-20161126-soga_qe2r2h.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.26 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
14134 |
H28-MOJ-Teikyo-Nara-2-Seg-2-20161128-Endo_kqsom5.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.193.13 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
14135 |
H28-MOJ-Teikyo-Nara-2-Seg-2-20161128-Endo_kqsom5.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.193.13 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15060 |
H28-MOJ-Teikyo-Nara-12-Seg-1-20161128-Endo_ot6e6s.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.196.15 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15061 |
H28-MOJ-Teikyo-Nara-12-Seg-1-20161128-Endo_ot6e6s.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.196.15 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15062 |
H28-MOJ-Teikyo-Nara-12-Seg-1-20161128-Endo_ot6e6s.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.196.15 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15063 |
H28-MOJ-Teikyo-Nara-12-Seg-1-20161128-Endo_ot6e6s.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.196.15 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15318 |
H28-MOJ-Teikyo-Nara-12-Seg-2-20161128-Endo_oug55j.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.196.16 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15319 |
H28-MOJ-Teikyo-Nara-12-Seg-2-20161128-Endo_oug55j.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.196.16 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15320 |
H28-MOJ-Teikyo-Nara-12-Seg-2-20161128-Endo_oug55j.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.196.16 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15321 |
H28-MOJ-Teikyo-Nara-12-Seg-2-20161128-Endo_oug55j.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.196.16 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15477 |
H28-MOJ-Teikyo-Nara-13-Seg-1-20161128-Endo_vv45dy.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.197.32 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15478 |
H28-MOJ-Teikyo-Nara-13-Seg-1-20161128-Endo_vv45dy.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.197.32 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15586 |
H28-MOJ-Teikyo-Nara-13-Seg-1-20161128-Endo_vv45dy.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.197.34 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15587 |
H28-MOJ-Teikyo-Nara-13-Seg-1-20161128-Endo_vv45dy.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.197.34 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15695 |
H28-MOJ-Teikyo-Nara-13-Seg-2-20161128-Endo_a7gs9h.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.197.33 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15696 |
H28-MOJ-Teikyo-Nara-13-Seg-2-20161128-Endo_a7gs9h.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.197.33 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15805 |
H28-MOJ-Teikyo-Nara-13-Seg-2-20161128-Endo_a7gs9h.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.197.35 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15806 |
H28-MOJ-Teikyo-Nara-13-Seg-2-20161128-Endo_a7gs9h.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.197.35 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15933 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.198.100 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
15934 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.198.100 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16064 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.198.129 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16065 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.198.129 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16195 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.198.25 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16196 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.198.25 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16337 |
H28-MOJ-Teikyo-Nara-14-Seg-2-20161128-Endo_byojab.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.198.128 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16338 |
H28-MOJ-Teikyo-Nara-14-Seg-2-20161128-Endo_byojab.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.198.128 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16466 |
H28-MOJ-Teikyo-Nara-14-Seg-2-20161128-Endo_byojab.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.198.26 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16467 |
H28-MOJ-Teikyo-Nara-14-Seg-2-20161128-Endo_byojab.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.198.26 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16579 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.166 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16580 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.166 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16688 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.30 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16689 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.30 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16886 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.62 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
16887 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.62 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17003 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.66 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17004 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.66 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17118 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.68 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17119 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.68 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17219 |
H28-MOJ-Teikyo-Nara-15-Seg-2-20161128-Endo_5usqei.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.31 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17220 |
H28-MOJ-Teikyo-Nara-15-Seg-2-20161128-Endo_5usqei.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.31 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17329 |
H28-MOJ-Teikyo-Nara-15-Seg-2-20161128-Endo_5usqei.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.67 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17330 |
H28-MOJ-Teikyo-Nara-15-Seg-2-20161128-Endo_5usqei.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.199.67 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17600 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.130 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17601 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.130 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17868 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.150 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
17869 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.150 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
18509 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.25 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
18510 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.25 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
18925 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.61 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
19232 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.120 |
tcp |
5480 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
19281 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.121 |
tcp |
5480 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
19407 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.129 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
19408 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.129 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
19676 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.26 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
19677 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.26 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
20355 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.65 |
tcp |
7099 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
20356 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.65 |
tcp |
3170 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
20357 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.65 |
tcp |
49209 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
20821 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.69 |
tcp |
1433 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
21013 |
H28-MOJ-Teikyo-Nara-17-seg-3-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.122 |
tcp |
5480 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
21568 |
H28-MOJ-Teikyo-Nara-17-seg-4-20161128-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.201.71 |
tcp |
1433 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
23398 |
nessus_H28-MOJ-Teikyo-Nara-19-seg-2-20161128-soga_959935420.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.203.14 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
23399 |
nessus_H28-MOJ-Teikyo-Nara-19-seg-2-20161128-soga_959935420.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.203.14 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
23623 |
H28-MOJ-Online-Funa-1-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
163.49.22.130 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
23624 |
H28-MOJ-Online-Funa-1-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
163.49.22.130 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
24380 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.1.150 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
24381 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.1.150 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
24382 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.1.150 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
24383 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.1.150 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
24635 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.1.33 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
24636 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.1.33 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
24637 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.1.33 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
24638 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.1.33 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
24819 |
H28-MOJ-Online-Funa-4-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.1.34 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
24820 |
H28-MOJ-Online-Funa-4-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.1.34 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25024 |
H28-MOJ-Online-Funa-5-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.2.5 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25025 |
H28-MOJ-Online-Funa-5-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.2.5 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25193 |
H28-MOJ-Online-Funa-5-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.2.6 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25194 |
H28-MOJ-Online-Funa-5-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.2.6 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25527 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.12 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25528 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.12 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25529 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.12 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25530 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.12 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25747 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.13 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25748 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.13 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25749 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.13 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25750 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.13 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25971 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.45 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25972 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.45 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25973 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.45 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
25974 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.45 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26186 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.48 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26187 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.48 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26188 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.48 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26189 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.48 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26398 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.57 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26399 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.57 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26400 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.57 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26401 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.57 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26619 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.9 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26620 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.9 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26621 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.9 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26622 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.9 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26839 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.10 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26840 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.10 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26841 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.10 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
26842 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.10 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27059 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.11 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27060 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.11 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27061 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.11 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27062 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.11 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27272 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.46 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27273 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.46 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27274 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.46 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27275 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.46 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27487 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.47 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27488 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.47 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27489 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.47 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27490 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.47 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27699 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.58 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27700 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.58 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27701 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.58 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27702 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.4.58 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27851 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.100 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27852 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.100 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27853 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.100 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27996 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.132 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27997 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.132 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
27998 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.132 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28142 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.25 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28143 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.25 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28144 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.25 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28299 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.128 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28300 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.128 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28301 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.128 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28446 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.130 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28447 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.130 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28448 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.130 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28593 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.26 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28594 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.26 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28595 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.26 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28737 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.27 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28738 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.27 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
28739 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.5.27 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
29025 |
H28-MOJ-Online-Funa-9-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.6.53 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
29026 |
H28-MOJ-Online-Funa-9-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.6.53 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
29182 |
H28-MOJ-Online-Funa-9-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.6.55 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
29183 |
H28-MOJ-Online-Funa-9-Seg-1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.6.55 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
29374 |
H28-MOJ-Online-Funa-9-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.6.54 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
29375 |
H28-MOJ-Online-Funa-9-Seg-2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.6.54 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
29666 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.9.129 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
29781 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.9.25 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
30646 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.9.63 |
tcp |
9855 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
31937 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.9.131 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
32078 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.9.150 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
32079 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.9.150 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
32080 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.9.150 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
32197 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.9.26 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
33297 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.9.133 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
33409 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.9.27 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
34459 |
H28-MOJ-Online-Funa-13-04-161103_ccslag.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.10.38 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
34460 |
H28-MOJ-Online-Funa-13-04-161103_ccslag.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.10.38 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
34637 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.11.151 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
34638 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.11.151 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
34639 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.11.151 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
34640 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.11.151 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
34947 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.11.33 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
34948 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.11.33 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
34949 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.11.33 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
34950 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.11.33 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
35087 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.11.5 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
35088 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.27.11.5 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37414 |
H28-MOJ-Online-Funa-19-01-161103_6tcyr3.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.25 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37415 |
H28-MOJ-Online-Funa-19-01-161103_6tcyr3.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.25 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37416 |
H28-MOJ-Online-Funa-19-01-161103_6tcyr3.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.25 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37561 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.26 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37562 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.26 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37563 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.26 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37708 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.27 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37709 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.27 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37710 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.27 |
tcp |
5000 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37816 |
H28-MOJ-Teikyo-Yokohama-2-Seg-1-161121-ohwada-x250.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.129.14 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
37817 |
H28-MOJ-Teikyo-Yokohama-2-Seg-1-161121-ohwada-x250.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.129.14 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39139 |
H28-MOJ-Teikyo-Yokohama-13-Seg-1-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.15 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39140 |
H28-MOJ-Teikyo-Yokohama-13-Seg-1-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.15 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39141 |
H28-MOJ-Teikyo-Yokohama-13-Seg-1-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.15 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39142 |
H28-MOJ-Teikyo-Yokohama-13-Seg-1-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.15 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39409 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.16 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39410 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.16 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39411 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.16 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39412 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.16 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39611 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.17 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39612 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.17 |
tcp |
23612 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39613 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.17 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39614 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.132.17 |
tcp |
23611 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39770 |
H28-MOJ-Teikyo-Yokohama-14-seg-01-21161121-abe_lsgo29.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.133.32 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39771 |
H28-MOJ-Teikyo-Yokohama-14-seg-01-21161121-abe_lsgo29.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.133.32 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39879 |
H28-MOJ-Teikyo-Yokohama-14-seg-01-21161121-abe_lsgo29.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.133.34 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39880 |
H28-MOJ-Teikyo-Yokohama-14-seg-01-21161121-abe_lsgo29.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.133.34 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39988 |
H28-MOJ-Teikyo-Yokohama-14-seg-02-21161121-abe_4l9d3v.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.133.33 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
39989 |
H28-MOJ-Teikyo-Yokohama-14-seg-02-21161121-abe_4l9d3v.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.133.33 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40098 |
H28-MOJ-Teikyo-Yokohama-14-seg-02-21161121-abe_4l9d3v.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.133.35 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40099 |
H28-MOJ-Teikyo-Yokohama-14-seg-02-21161121-abe_4l9d3v.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.133.35 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40226 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.134.100 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40227 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.134.100 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40360 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.134.129 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40361 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.134.129 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40491 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.134.26 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40492 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.134.26 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40624 |
H28-MOJ-Teikyo-Yokohama-15-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.134.128 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40625 |
H28-MOJ-Teikyo-Yokohama-15-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.134.128 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40755 |
H28-MOJ-Teikyo-Yokohama-15-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.134.25 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
40756 |
H28-MOJ-Teikyo-Yokohama-15-Seg-2-161121-ohwada-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.134.25 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
41866 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.166 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
41867 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.166 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
42590 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.30 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
42591 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.30 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
42947 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.62 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
42948 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.62 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
43367 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.65 |
tcp |
7099 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
43368 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.65 |
tcp |
3170 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
43369 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.65 |
tcp |
49213 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
43508 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.66 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
43509 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.66 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
43632 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.68 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
43633 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.68 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
43905 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.69 |
tcp |
1433 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
44251 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.71 |
tcp |
1433 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
44343 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.120 |
tcp |
5480 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
44392 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.121 |
tcp |
5480 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
44441 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.122 |
tcp |
5480 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
44566 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.129 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
44567 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.129 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
45225 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.31 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
45226 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.31 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
45557 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.61 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
45840 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.67 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
45841 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.138.67 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
47365 |
H28-MOJ-Teikyo-Yokohama-20-Seg-1-161121-Endo_694n4z.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.140.13 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
47366 |
H28-MOJ-Teikyo-Yokohama-20-Seg-1-161121-Endo_694n4z.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.140.13 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
47563 |
H28-MOJ-Teikyo-Yokohama-20-Seg-2-161121-Endo_nnt1f7.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.140.14 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
47564 |
H28-MOJ-Teikyo-Yokohama-20-Seg-2-161121-Endo_nnt1f7.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.140.14 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
47980 |
H28-MOJ-Teikyo-Yokohama-22-Seg-1-161121-Endo_ox5v27.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.1 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
47981 |
H28-MOJ-Teikyo-Yokohama-22-Seg-1-161121-Endo_ox5v27.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.1 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
48113 |
H28-MOJ-Teikyo-Yokohama-22-Seg-2-161121-Endo_j5lot6.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.2 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
48114 |
H28-MOJ-Teikyo-Yokohama-22-Seg-2-161121-Endo_j5lot6.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.1.2 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
48769 |
H28-MOJ-Teikyo-Makuhari-4-Seg-1-161124-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.162.62 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
48770 |
H28-MOJ-Teikyo-Makuhari-4-Seg-1-161124-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.162.62 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
49660 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-1-161122-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.152.62 |
tcp |
9906 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
49661 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-1-161122-w510.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.30.152.62 |
tcp |
9907 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
49942 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.126 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
49986 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.130 |
tcp |
8084 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
49987 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.130 |
tcp |
8083 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
50120 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.15 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
50218 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.160 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
50392 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.18 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
50393 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.18 |
tcp |
1433 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
50486 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.21 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
50576 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.22 |
tcp |
1311 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
50626 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.226 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
50679 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.39 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
50731 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.63 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
50935 |
H28_MUN_DWEB_Q4_172_16_211_0_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.211.54 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
51086 |
H28_MUN_DWEB_Q4_172_16_212_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.212.220 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
51163 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.115 |
tcp |
1311 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
51164 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.115 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
51964 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.131 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
52121 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.150 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
52123 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
31743 |
81085 |
CVE-2014-3566 |
7.1 |
High |
172.16.240.150 |
tcp |
0 |
ESXi 5.5 < Build 2352327 Multiple Vulnerabilities (remote check) (POODLE) |
The remote VMware ESXi 5.5 host is affected by multiple
vulnerabilities. |
The remote VMware ESXi host is version 5.5 prior to build 2352327. It
is, therefore, affected by the following vulnerabilities :
- An error exists related to DTLS SRTP extension handling
and specially crafted handshake messages that can allow
denial of service attacks via memory leaks.
(CVE-2014-3513)
- An error exists related to the way SSL 3.0 handles
padding bytes when decrypting messages encrypted using
block ciphers in cipher block chaining (CBC) mode. A
man-in-the-middle attacker can decrypt a selected byte
of a cipher text in as few as 256 tries if they are able
to force a victim application to repeatedly send the
same data over newly created SSL 3.0 connections. This
is also known as the "POODLE" issue. (CVE-2014-3566)
- An error exists related to session ticket handling that
can allow denial of service attacks via memory leaks.
(CVE-2014-3567)
- An error exists related to the build configuration
process and the "no-ssl3" build option that allows
servers and clients to process insecure SSL 3.0
handshake messages. (CVE-2014-3568)
- A denial of service vulnerability in libxml2 due to
entity expansion even when entity substitution is
disabled. A remote attacker, using a crafted XML
document containing larger number of nested entity
references, can cause the consumption of CPU resources.
(CVE-2014-3660)
- An unspecified privilege escalation vulnerability.
(CVE-2014-8370)
- An unspecified denial of service vulnerability due to an
input validation issue in the VMware Authorization
process (vmware-authd). (CVE-2015-1044) |
Apply patch ESXi550-201403102-SG and ESXi550-201501101-SG for ESXi
5.5. |
https://www.vmware.com/security/advisories/VMSA-2015-0001.html
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
ESXi version : ESXi 5.5 Installed build : 1892794 Fixed build : 2352327 |
|
52246 |
H28_MUN_DWEB_Q4_172_16_242_seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.242.254 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
52338 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.130 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
52419 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.141 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
52510 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.15 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
52592 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.181 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
52765 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.19 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
52856 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.24 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
52901 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.243 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53060 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.62 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53149 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.71 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53231 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.88 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53324 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.9 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53381 |
H28_MUN_DWEB_Q4_192_168_242_part5.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.65 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53382 |
H28_MUN_DWEB_Q4_192_168_242_part5.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.65 |
tcp |
1311 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53467 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.123 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53468 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.123 |
tcp |
1311 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53539 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.153 |
tcp |
1433 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53623 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.163 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53714 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.18 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53807 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.20 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53888 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.63 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
53959 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.65 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
54081 |
H28_MUN_DWEB_Q4_192_168_243_Part2_Retry2IPs.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.241 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
54130 |
H28_MUN_DWEB_Q4_192_168_243_Part2_Retry2IPs.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.242 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
54486 |
1_Tokyu_remi_20170126.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
54.199.215.149 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55088 |
13_tokyu_bellselect_20170118.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
218.45.196.196 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55318 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.126 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55355 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.130 |
tcp |
8084 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55356 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.130 |
tcp |
8083 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55475 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.15 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55561 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.160 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55723 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.18 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55724 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.18 |
tcp |
1433 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55851 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.21 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55933 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.22 |
tcp |
1311 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
55982 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.226 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56031 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.39 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56078 |
H28_DWEB_NW_Scan_Q1_172_16_20_Seg_20160518_w9z1nf.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.20.63 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56117 |
H28_DWEB_NW_Scan_Q1_172_16_211_Seg_20160518_xux6yw.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.211.54 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56247 |
H28_DWEB_NW_Scan_Q1_172_16_212_Seg_20160518_24dedy.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.212.220 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56579 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
32100 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56580 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
31100 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56581 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
12443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56582 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
10109 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56583 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
8191 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56584 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
8443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56585 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56586 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
10443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56587 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
9443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56588 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
7444 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56589 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.100 |
tcp |
1433 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56615 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
81146 |
CVE-2014-3566 |
7.1 |
High |
172.16.240.100 |
tcp |
443 |
VMware Security Updates for vCenter Server (VMSA-2015-0001) (POODLE) |
The remote host has a virtualization management application installed
that is affected by multiple security vulnerabilities. |
The VMware vCenter Server installed on the remote host is version 5.5
prior to Update 2d. It is, therefore, affected by multiple
vulnerabilities in the included OpenSSL library :
- An error exists related to DTLS SRTP extension handling
and specially crafted handshake messages that can allow
denial of service attacks via memory leaks.
(CVE-2014-3513)
- An error exists related to the way SSL 3.0 handles
padding bytes when decrypting messages encrypted using
block ciphers in cipher block chaining (CBC) mode.
Man-in-the-middle attackers can decrypt a selected byte
of a cipher text in as few as 256 tries if they are able
to force a victim application to repeatedly send the
same data over newly created SSL 3.0 connections. This
is also known as the "POODLE" issue. (CVE-2014-3566)
- An error exists related to session ticket handling that
can allow denial of service attacks via memory leaks.
(CVE-2014-3567)
- An error exists related to the build configuration
process and the "no-ssl3" build option that allows
servers and clients to process insecure SSL 3.0
handshake messages. (CVE-2014-3568) |
Upgrade to VMware vCenter Server 5.5u2d (5.5.0 build-2183111) or
later. |
http://www.vmware.com/security/advisories/VMSA-2015-0001.html
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Installed version : 5.5.0 build-1945274 Fixed version : 5.5.0 build-2183111 |
|
56618 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
83186 |
CVE-2014-3566 |
10 |
Critical |
172.16.240.100 |
tcp |
443 |
VMware vCenter Server Multiple Java Vulnerabilities (VMSA-2015-0003) (POODLE) |
The remote host has a virtualization management application installed
that is affected by multiple vulnerabilities. |
The VMware vCenter Server installed on the remote host is version 5.0
prior to 5.0u3d, 5.1 prior to 5.1u3a, 5.5 prior to 5.5u2e, or 6.0
prior to 6.0.0a. It is, therefore, affected by a man-in-the-middle
(MitM) information disclosure vulnerability known as POODLE, related
to the bundled JRE component. The vulnerability is due to the way SSL
3.0 handles padding bytes when decrypting messages encrypted using
block ciphers in cipher block chaining (CBC) mode. MitM attackers can
decrypt a selected byte of a cipher text in as few as 256 tries if
they are able to force a victim application to repeatedly send the
same data over newly created SSL 3.0 connections.
Additionally, multiple unspecified vulnerabilities also exist in the
following bundled JRE components :
- 2D (CVE-2014-6585, CVE-2014-6591)
- Deployment (CVE-2015-0403, CVE-2015-0406)
- Hotspot (CVE-2014-6601, CVE-2015-0383, CVE-2015-0395,
CVE-2015-0437)
- Installation (CVE-2015-0421)
- JAX-WS (CVE-2015-0412)
- JSSE (CVE-2014-6593)
- Libraries (CVE-2014-6549, CVE-2014-6587, CVE-2015-0400)
- RMI (CVE-2015-0408)
- Security (CVE-2015-0410)
- Serviceability (CVE-2015-0413)
- Swing (CVE-2015-0407) |
Upgrade to VMware vCenter Server 5.0u3d (5.0.0 build-2656067) / 5.1u3a
(5.1.0 build-2669725) / 5.5u2e (5.5.0 build-2646482) / 6.0.0a (6.0.0
build-2656757) or later. |
http://www.vmware.com/security/advisories/VMSA-2015-0003.html
http://seclists.org/fulldisclosure/2015/Apr/5
http://www.nessus.org/u?c02f1515
http://www.nessus.org/u?12e35b07
http://www.nessus.org/u?726f7054
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Installed version : 5.5.0 build-1945274 Fixed version : 5.5.0 build-2646482 |
|
56744 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.115 |
tcp |
1311 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
56745 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.115 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
57540 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.131 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
57690 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.150 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
57692 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
81085 |
CVE-2014-3566 |
7.1 |
High |
172.16.240.150 |
tcp |
0 |
ESXi 5.5 < Build 2352327 Multiple Vulnerabilities (remote check) (POODLE) |
The remote VMware ESXi 5.5 host is affected by multiple
vulnerabilities. |
The remote VMware ESXi host is version 5.5 prior to build 2352327. It
is, therefore, affected by the following vulnerabilities :
- An error exists related to DTLS SRTP extension handling
and specially crafted handshake messages that can allow
denial of service attacks via memory leaks.
(CVE-2014-3513)
- An error exists related to the way SSL 3.0 handles
padding bytes when decrypting messages encrypted using
block ciphers in cipher block chaining (CBC) mode. A
man-in-the-middle attacker can decrypt a selected byte
of a cipher text in as few as 256 tries if they are able
to force a victim application to repeatedly send the
same data over newly created SSL 3.0 connections. This
is also known as the "POODLE" issue. (CVE-2014-3566)
- An error exists related to session ticket handling that
can allow denial of service attacks via memory leaks.
(CVE-2014-3567)
- An error exists related to the build configuration
process and the "no-ssl3" build option that allows
servers and clients to process insecure SSL 3.0
handshake messages. (CVE-2014-3568)
- A denial of service vulnerability in libxml2 due to
entity expansion even when entity substitution is
disabled. A remote attacker, using a crafted XML
document containing larger number of nested entity
references, can cause the consumption of CPU resources.
(CVE-2014-3660)
- An unspecified privilege escalation vulnerability.
(CVE-2014-8370)
- An unspecified denial of service vulnerability due to an
input validation issue in the VMware Authorization
process (vmware-authd). (CVE-2015-1044) |
Apply patch ESXi550-201403102-SG and ESXi550-201501101-SG for ESXi
5.5. |
https://www.vmware.com/security/advisories/VMSA-2015-0001.html
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
ESXi version : ESXi 5.5 Installed build : 1892794 Fixed build : 2352327 |
|
57757 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.240.35 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58054 |
H28_DWeb_NWScan_Q1_172_16_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
172.16.242.254 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58219 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.112 |
tcp |
443 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58220 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.112 |
tcp |
49183 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58303 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.130 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58375 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.141 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58457 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.15 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58529 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.181 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58684 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.19 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58765 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.24 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58809 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.243 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
58955 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.62 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59026 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.65 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59027 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.65 |
tcp |
1311 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59110 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.71 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59239 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.88 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59324 |
H28_DWeb_NWScan_Q1_192_168_242_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.242.9 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59400 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.123 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59401 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.123 |
tcp |
1311 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59472 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.124 |
tcp |
1311 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59537 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.153 |
tcp |
1433 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59620 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.163 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59705 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.18 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59791 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.20 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59891 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.216 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59892 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.216 |
tcp |
1311 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59893 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.216 |
tcp |
1226 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59940 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.241 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
59981 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.242 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
60055 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.63 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|
60118 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
31743 |
78479 |
CVE-2014-3566 |
4.3 |
Medium |
192.168.243.65 |
tcp |
9898 |
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) |
It is possible to obtain sensitive information from the remote host
with SSL/TLS-enabled services. |
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be "rolled back" to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents "version rollback" attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability. |
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled. |
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 |
Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. |
|