Security advisories

“Logjam” TLS Vulnerability

February 26, 2019 | 1 MIN READ

Speak With A Security Expert Now

TALK TO AN EXPERT

A vulnerability recently exposed in Diffie-Hellman key exchange for TLS is potentially serious. However, it can be mitigated by doing the following on all of your TLS/SSL enabled systems:

Due to the nature of this vulnerability, we do not currently have signatures for detecting an exploit attempt in progress. However, we are actively researching methods of detection that can be rolled out to our sensors.

What We Know

The mechanics of this exploit require Man-in-the-Middle access to the network between the client and server, which makes the largest potential threat either internal users or outside users accessing an insecure network.

Affected known Protocols (TLS):

The below post on the Logjam attack outlines the configuration changes needed to generate a unique 2048-bit Diffie-Hellman group on common servers applications and will allow Server Test for HTTPS web servers.
https://weakdh.org/sysadmin.html (Site experiencing heavy load)

eSentire Defenses

eSentire has confirmed that our internal systems and the sensors deployed at client sites are protected against this threat. Current eSentire Continuous Vulnerability Service subscribers will receive in their next monthly report the details of any systems vulnerable to this attack.

Further Protection

How to further protect yourself from these (and other) emerging threats:

Resources

View Most Recent Advisories