BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Retina Helps Identify Weak Certificates

Post by Jerome Diggs September 25, 2012

Microsoft has released a Security Advisory for the upcoming patch to increase minimum bit levels of certificates to 1024 bit security advisory 2661254.  The expected release date for this patch is Oct 9th at which time the update will be available through Windows Update. This change to the minimum bits level of certificates will change the Windows certificate system and will cause it to stop accepting certificates that are less than 1024 bits as those keys are considered ‘weak’. This change will affect all Windows operating systems above Windows XP SP3 and Windows 8 already implements the tighter certificate check.

To help identify systems that are leveraging weak certificates the Retina solutions have audit ID 12609 – SSL Certificate Weak Public Key Strength enabled by default.

This audit is available with Retina Community and the commercial version of Retina.  Users can include these new checks in a general vulnerability scan, or can create a targeted scan to specifically look for these specific vulnerabilities.

Feel free to download and try out our community version to discover, assess and gain remediation guidance in our simple to use standalone scanner. In addition to standard assessment of patches, insecure configurations and zero-days, the commercial version of Retina Network also provides in-depth credentialed scans for over 2500 operating systems, databases, web applications, network devices, applications, mobile devices, cloud providers and virtual applications.  https://www.eeye.com/purchase/compare-products

Once you’ve identified systems that need to be updated you’ll need to consult with the various vendors on the processes required to incorporate stronger certificates for their products.  For detailed information on how this affects Beyondtrust’s products please visit our support page.

Tags:
, , , , ,

Leave a Reply

Additional articles

BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,