Skip to content

Protocol: TLS vulnerabilities

Identifier: tls_configuration_vuln

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner

Description

TLS vulnerabilities come from improper configuration of the encryption protocols, ciphers, and certificates that protect data during transmission. If these elements arent set up securely, attackers can potentially intercept or tamper with sensitive information like user credentials. This can expose your data to eavesdropping and man-in-the-middle attacks. Developers sometimes rush setups or use outdated settings, which increases the risk of a security breach. It's essential to use current, strong encryption practices and validate certificates properly to ensure authenticated and secure communication channels.

References:

Configuration

Example

Example configuration:

---
security_tests:
  tls_configuration_vuln:
    assets_allowed:
    - REST
    - GRAPHQL
    - WEBAPP
    skip: false

Reference

assets_allowed

Type : List[AssetType]*

List of assets that this check will cover.

skip

Type : boolean

Skip the test if true.