2.4 Do Not Use Default or Shared Cryptographic Material

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If an attacker gains access to shared cryptographic material, including default material, the attacker can reuse that material to impersonate the MySQL server or otherwise compromise its operations.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Generate new certificates, keys, and other cryptographic material as needed for each affected MySQL instance.

See Also

https://workbench.cisecurity.org/files/1619