2.1.4 Ensure 'ALLOWED_WEAK_CERT_ALGORITHMS' Is NOT Set.

Information

The ALLOWED_WEAK_CERT_ALGORITHMS setting determines whether Oracle accepts certificates signed with the SHA1 or MD5 or both algorithms.

Weak algorithms such as MD5 and SHA1 have known vulnerabilities that make them susceptible to attacks. Allowing their use can compromise data integrity and authentication, potentially exposing systems to risks. Transitioning to stronger algorithms, such as SHA-2, is recommended.

Solution

To remediate this recommendation, remove the ALLOWED_WEAK_CERT_ALGORITHMS parameter.

Impact:

Applications that use MD5 or SHA-1-signed certificates must be updated to use certificates signed with a stronger, more secure algorithm such as SHA-2.

See Also

https://workbench.cisecurity.org/benchmarks/16474

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-5, 800-53|IA-5(1), 800-53|SC-8, 800-53|SC-8(1), CSCv7|14.4

Plugin: Unix

Control ID: 1b0336eb7669eeba04f3dc2c9cdf3d869270c265733216a959377ae3d07ee4ce