-
Notifications
You must be signed in to change notification settings - Fork 54
False result on Microsoft Windows 2012 #2
Comments
Also please note that the test does NOT confirm that it is 100% not patched! |
+1. This test is bullshit. Just because these ciphersuites are now enabled does not mean the actual vulnerability is patched. That is NOT how you write vulnerability test-scripts. Since there is - to date - no further information available on the vulnerability, it's rather hard to test for it. I'd recommend to remove this repository because admins might use it for testing production systems and get false-positives. Questionable at best. For reference: http://nmap.org/nsedoc/categories/vuln.html |
Let me comment on that as well. @azet Those cipher suites have been added with the patch set that fixes the vulnerability, according to Microsoft. In a default configuration those newly added ciphers will be enabled, so these are new features/behavior the script is checking for. Also, the script says "seems to be patched", not "is patched", subtle difference. |
Any chance this server is behind some sort of SSL offloading mechanism? Did you try checking against the default RDP port yet (3389)? |
@speijnik the machines are behind a loadbalancer, but the SSL is handled by the IIS server. I know that the result isn't mangled by the loadbalancers as they support some other ciphers which do not come in the SSLScan. |
@users21 Could not reproduce that here. Are you sure those cipher names are exactly the same? ie. DHE-RSA-AES256-GCM-SHA384 (which was added by the security fixes) is not the same cipher as DHE-DSS-AES256-GCM-SHA384 I would be interested in the complete cipher list of your unpatched systems though, if you were to share those. |
From a scan made 2014-10-28 on a MSWin2012: One of the patches which hasn't yet been applied is the 2992611, so the machine hasn't been yet patched and all automatic updates or pre-fetching has been disabled. As far as I know, following ciphers are supported (limited by what my desktop machine supports): This is identical to what I get scanning a MSWin2012 machine which has the 2992611 applied |
You were right in the first place. Windows Server 2012 R2 does support those ciphers regardless of whether 2992611 is applied or not. Seems like the documentation of that patch was wrong. I just pushed an update of the script which takes that into account and report that the result is "UNKNOWN" if either Windows Server 2012 or later is detected. Also, I've added a few more warnings and notes that should finally make clear how the test works, that it can be inconclusive in some cases and that this test saying the system is patched does not mean one does not have to check manually. As for the EC ciphers: this is a long-shot right now, but those ciphers seem to be supported by Windows Server 2012 or later. |
The script seems to detect the correct version of server, I feel like it's way too much text, maybe a flag which makes you skip the "do you understand" question, if you want to make this more automated test. But on the other hand, everyone should have patched by now... |
Did run the script against an unpatched Microsoft Windows 2012 Server with IIS8.5 and got the following result:
Testing xxxx:443 for ciphers added in MS14-066...
Testing cipher DHE-RSA-AES256-GCM-SHA384: PASS
Testing cipher DHE-RSA-AES128-GCM-SHA256: PASS
Testing cipher AES256-GCM-SHA384: PASS
Testing cipher AES128-GCM-SHA256: PASS
System at xxxx:443 seems to be patched: YES
So the test will give you a false positive on MSW2012 which could be interpreted that the machine would have been patched.
The text was updated successfully, but these errors were encountered: