Connectrix MDS series: SSL or TLS Server Supports Transport Layer Security TLS1.1

Riepilogo: This vulnerability is reported without any Qualys ID (QID) or CVE identifier.

Questo articolo si applica a Questo articolo non si applica a Questo articolo non è legato a un prodotto specifico. Non tutte le versioni del prodotto sono identificate in questo articolo.

Sintomi

"Secure Sockets Layer (SSL) or Transport Layer Security (TLS) Server Supports Transport Layer Security (TLSv1.1)"

Threat: The scan target supports version 1.1 of the TLS protocol. That version is in the process of being deprecated and is no longer recommended. Instead the newer versions 1.2 and/or 1.3 should be used. The TLSv1.1 protocol itself does not have any currently exploitable vulnerabilities. However some vendor implementations of TLSv1.1 have weaknesses which may be exploitable. This QID is posted as potential, when servers require client certificates and we cannot complete the handshake.

Results: TLSv1.1 is supported.

Solution: Disable the use of TLSv1.1 protocol in favor of a cryptographically stronger protocol such as TLSv1.2.
The following openssl commands can be used to do a manual test: openssl s_client -connect ip:port -tls1_1
If the test is successful, then the target support TLSv1.1.

Capture the output from the command below of the switch:

`show file volatile:///nxapi.log`

HTTPS port is 8443
Options gathered - vdc: 1, servers: 4, http: -1, https: 8443,
cert: /var/nginx/cert/server.crt_vdc_1, key: /var/nginx/cert/server.key_vdc_1, sandbox: false, protocols: TLSv1.2, ciphers: false

This means that TLS 1.0 and 1.1 are disabled and TLSv1.2 is enabled on the switch. Hence, the vulnerability can be concluded as false positive.

Causa

On March 31, 2021 Transport Layer Security (TLS) versions 1.0 (RFC-2246) and 1.1 (RFC-4346) are formally deprecated.

See Deprecating TLS 1.0 and TLS 1.1:
Internet Engineering Task Force (IETF)This hyperlink is taking you to a website outside of Dell Technologies.
Request for Comments (RFC) 8996 
This hyperlink is taking you to a website outside of Dell Technologies.

Risoluzione

If it still accepts TLSv1 and TLSv1.1, you can manually configure the TLS versions used:

switch(config)# nxapi ssl protocols TLSv1.2          <--To enable TLSv1.2

switch(config)# no nxapi ssl protocols TLSv1         <--To disable TLSv1-disabling TLSv1 removes TLS 1.0 and 1.1.

Prodotti interessati

Connectrix MDS-Series Firmware 9.X

Prodotti

Connectrix MDS-Series Firmware, Connectrix MDS-Series Firmware 8.X, Connectrix MDS-Series Hardware
Proprietà dell'articolo
Numero articolo: 000224554
Tipo di articolo: Solution
Ultima modifica: 28 mag 2025
Versione:  3
Trova risposta alle tue domande dagli altri utenti Dell
Support Services
Verifica che il dispositivo sia coperto dai Servizi di supporto.