Weak Cipher Detection
Reference
Plugin Id: 500001 | CWE: 326
Remediation
To address Weak Cipher Check - Insufficient Transport Layer Protection vulnerabilities in an OpenAPI specification, follow these steps:
-
Enable Strong SSL/TLS Ciphers: Ensure that only strong SSL/TLS ciphers are enabled for securing API communications. Define security requirements in the OpenAPI specification to enforce the use of modern cryptographic algorithms and key lengths.
servers: - url: https://api.example.com description: Secure API server (TLS/SSL)
-
Disable Weak Ciphers: Disable deprecated or weak SSL/TLS ciphers that are vulnerable to attacks. Specify in the OpenAPI specification the list of ciphers that should be avoided to prevent exploitation of cryptographic weaknesses.
-
Enforce TLS Version: Enforce the use of the latest TLS version to mitigate known vulnerabilities in older versions. Define minimum TLS version requirements in the OpenAPI specification to ensure secure transport layer protection.
About
Weak Cipher Check - Insufficient Transport Layer Protection vulnerabilities arise when APIs use outdated or insecure SSL/TLS ciphers, exposing sensitive data to interception or tampering by attackers.
Risks
The risks associated with Weak Cipher Check - Insufficient Transport Layer Protection vulnerabilities include data interception, man-in-the-middle attacks, and unauthorized access to sensitive information. Implementing strong SSL/TLS ciphers and enforcing secure transport layer configurations is crucial for protecting API communications from cryptographic weaknesses and security threats.