Unsolved
This post is more than 5 years old
3 Posts
0
3317
September 9th, 2019 15:00
Vulnerability (SSH Weak Algorithms Supported) on iDRAC 6 with Firmware Version 2.85 & 2.91
Hello,
I have the following vulnerability detected iDRAC 6 with Firmware Version 2.85 & 2.91. I wonder if anyone was able to fix this vulnerability?
(SSH Weak Algorithms Supported)
Thank you,
Peter
0 events found
No Events found!


DELL-Chris H
7 Practitioner
•
9.7K Posts
0
September 10th, 2019 07:00
Peter Fakory,
I believe the issue you are seeing is due to the iDrac supporting 64-bit ciphers by default which has 3EDS enabled. While normally on the later firmware versions it should have done this on its own, but could you configure SSL Encryption strength to 256 bit or higher (seen below) in IDRAC Settings->Network->Server->Web Server section. This will disable 3DES along with other weaker ciphers.
Let me know how it goes, and what you see.
Peter Fakory
3 Posts
0
September 22nd, 2019 16:00
Thank you Chris for getting back to me.
Unfortunately, I see only 'SSL Encryption' option but I don't see the option 'TLS Protocol'. Do you have any idea why I don't see it?
Thank you,
Peter
ScotC61
1 Message
0
March 1st, 2023 10:00
That changes the ciphers used by the web server, but not for ssh. The only way I have been able to get our vulnerability scanner to stop complaining about ssh on the iDRACs is to disable ssh. That's not ideal. What can be done to improve the strength of the ssh algorithms?
Also, even when SSL and TLS on the web server are set to their highest security, there are still several weaknesses being reported.