POLICY-OTHER --
POLICY-OTHER SSLv3 Client Hello attempt
The design of the Internet Key Exchange (IKE) protocol, when using Aggressive Mode for shared secret authentication, does not encrypt initiator or responder identities during negotiation, which may allow remote attackers to determine valid usernames by (1) monitoring responses before the password is supplied or (2) sniffing, as originally reported for FireWall-1 SecuRemote. Impact: CVSS base score 5.0 CVSS impact score 2.9 CVSS exploitability score 10.0 confidentialityImpact PARTIAL integrityImpact NONE availabilityImpact NONE Details: Ease of Attack:
This rule alerts when an attempt to identify if SSL version 3 is being used by a system.
No public information
No known false positives
Talos research team. This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology. For more information see [nvd].
No rule groups
CVE-2002-1623 |
Loading description
|
CVE-2013-2566 |
Loading description
|
Tactic: Discovery
Technique: System Network Configuration Discovery
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org