Protocol: TLS vulnerabilities¶
Identifier:
tls_configuration_vuln
Scanner(s) Support¶
GraphQL Scanner | REST Scanner | WebApp Scanner |
---|---|---|
Description¶
TLS vulnerabilities come from improper configuration of the encryption protocols, ciphers, and certificates that protect data during transmission. If these elements arent set up securely, attackers can potentially intercept or tamper with sensitive information like user credentials. This can expose your data to eavesdropping and man-in-the-middle attacks. Developers sometimes rush setups or use outdated settings, which increases the risk of a security breach. It's essential to use current, strong encryption practices and validate certificates properly to ensure authenticated and secure communication channels.
References:
- https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Security_Cheat_Sheet.html
- https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/09-Testing_for_Weak_Cryptography/01-Testing_for_Weak_SSL_TLS_Ciphers_Insufficient_Transport_Layer_Protection
- https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices
Configuration¶
Example¶
Example configuration:
Reference¶
assets_allowed
¶
Type : List[AssetType]
*
List of assets that this check will cover.
skip
¶
Type : boolean
Skip the test if true.