2.2.3 Ensure 'ALLOWED_WEAK_CERT_ALGORITHMS' Is NOT Set

Information

The setting ALLOWED_WEAK_CERT_ALGORITHMS determines whether Oracle accepts certificates signed with the SHA-1 or MD5 or both algorithms.

Weak algorithms such as MD5 and SHA-1 have known vulnerabilities that make them susceptible to attacks. Allowing their use can compromise data integrity and authentication, potentially exposing systems to risks. Transitioning to stronger algorithms, such as SHA-2, is recommended.

Solution

To remediate this recommendation, remove the ALLOWED_WEAK_CERT_ALGORITHMS parameter.

Impact:

Applications that use MD5 or SHA-1-signed certificates must be updated to use certificates signed with a stronger, more secure algorithm such as SHA-2.

See Also

https://workbench.cisecurity.org/benchmarks/16474

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-5, 800-53|IA-5(1), 800-53|SC-8, 800-53|SC-8(1), CSCv7|14.4

Plugin: Unix

Control ID: f8c5b5380d0ed97486f09f36c6700775f7db9b34997c612b8df71ffe6a73bb08