SSL: RSA Export Grade Cipher Suite

This signature detects a SSL-CLIENT-HELLO request with 'export-grade' RSA cipher suites. Most 'modern' clients (e.g., web browsers) won't offer export grade ciphersuites as part of the negotiation process as they are considered as weak encryption.

Extended Description

Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204 and CVE-2015-1067.

Affected Products

Microsoft windows_server_2003

References

CVE: CVE-2015-1637

Short Name
SSL:AUDIT:RSA-EXPORT-CIPHER
Severity
Minor
Recommended
True
Recommended Action
None
Category
SSL
Keywords
CVE-2015-0204 CVE-2015-1637 Cipher Export Grade RSA Suite
Release Date
03/04/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

4.3

Found a potential security threat?