2.1.4 Ensure 'ALLOWED_WEAK_CERT_ALGORITHMS' Is NOT Set.

Information

The ALLOWED_WEAK_CERT_ALGORITHMS setting determines whether Oracle accepts certificates signed with the SHA1 or MD5 or both algorithms.

Weak algorithms such as MD5 and SHA1 have known vulnerabilities that make them susceptible to attacks. Allowing their use can compromise data integrity and authentication, potentially exposing systems to risks. Transitioning to stronger algorithms, such as SHA-2, is recommended.

Solution

To remediate this recommendation, set the ALLOWED_WEAK_CERT_ALGORITHMS parameter to NONE

Impact:

Applications that use MD5 or SHA-1-signed certificates must be updated to use certificates signed with a stronger, more secure algorithm such as SHA-2.

See Also

https://workbench.cisecurity.org/benchmarks/21740

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-5, 800-53|IA-5(1), 800-53|SC-8, 800-53|SC-8(1), CSCv7|14.4

Plugin: Unix

Control ID: 1b0336eb7669eeba04f3dc2c9cdf3d869270c265733216a959377ae3d07ee4ce