Jump to content
Welcome to our new Citrix community!
  • 0

Nessus vulnerabilities after upgrading to 7.16 CU5


Question

Last week we upgraded to 7.16 CU5. A few days later our security team did their weekly scans and revealed SSL2/3 issues on the servers. I put a ticket into Citrix and they think it is our Netscaler, which we haven't touched in awhile.

image.thumb.png.8104376d853130883518ccdff6ad196f.png

Looking up more info on it, ----

SSLv3 is enabled and the server supports at least one cipher.
    Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3

 

It appears CU5 is talking on SSL 3, on port 5986, has anyone come across this before?

 

Thanks

 


 

Link to comment

2 answers to this question

Recommended Posts

  • 0

Plugin is 20007.  Since my post yesterday, we discovered that it may be related to the server O/S instead, waiting for the NESSUS scan results to come back.

 

I ran:

winrm e winrm/config/listener

and found winRM on this port.

I used IISCrypto to disable SSL2/3 and TLS 1.0. and rebooted.

 

Very odd to say the least that the issue came up on all Windows 2012 R2 servers, days after the the CU5 upgrade. Wonder if a Windows update snuck in and turn on SSL and TLS.

Link to comment

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...