2.2.3 Ensure 'ALLOWED_WEAK_CERT_ALGORITHMS' Is NOT Set

Information

The setting ALLOWED_WEAK_CERT_ALGORITHMS determines whether Oracle accepts certificates signed with the SHA-1 or MD5 or both algorithms.

Weak algorithms such as MD5 and SHA-1 have known vulnerabilities that make them susceptible to attacks. Allowing their use can compromise data integrity and authentication, potentially exposing systems to risks. Transitioning to stronger algorithms, such as SHA-2, is recommended.

Solution

To remediate this recommendation, set the ALLOWED_WEAK_CERT_ALGORITHMS parameter to NONE.

Impact:

Applications that use MD5 or SHA-1-signed certificates must be updated to use certificates signed with a stronger, more secure algorithm such as SHA-2.

See Also

https://workbench.cisecurity.org/benchmarks/23897

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-5, 800-53|IA-5(1), 800-53|SC-8, 800-53|SC-8(1), CSCv7|14.4

Plugin: Unix

Control ID: d20883593cae6a9cdf38e7ac1e1bb2dac86044052460435d25e17f2b1d991a47