Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
  • Sign in
  • T test-issuse
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 5
    • Issues 5
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Infrastructure Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value Stream
  • Wiki
    • Wiki
  • External wiki
    • External wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Nguyen Tien Lam
  • test-issuse
  • Issues
  • #3

Closed
Open
Created Nov 15, 2023 by test@project_221_botMaintainer

Acunetix - TLS 1.0 enabled

Target URL https://egov.quangnam.gov.vn
Severity Medium
Affects

https://egov.quangnam.gov.vn/

Attack Details

The SSL server (port: 443) encrypts traffic using TLSv1.0.

HTTP Request
Vulnerability Description

The web server supports encryption through TLS 1.0. TLS 1.0 is not considered to be "strong cryptography" as defined and required by the PCI Data Security Standard 3.2(.1) when used to protect sensitive information transferred to or from web sites.

	According to PCI, "30 June 2018 is the deadline for disabling SSL/early TLS and implementing a more secure encryption protocol – TLS 1.1 or higher (TLS v1.2 is strongly encouraged) in order to meet the PCI Data Security Standard (PCI DSS) for safeguarding payment data.
Impact

An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between the affected service and clients.

Remediation

It is recommended to disable TLS 1.0 and replace it with TLS 1.2 or higher.


References
Are You Ready for 30 June 2018? Saying Goodbye to SSL/early TLS
PCI 3.1 and TLS 1.2 (Cloudflare Support)

Assignee
Assign to
None
Milestone
None
Assign milestone
Time tracking