Xerox WorkCentre 6400 OpenSSL RSA Temporary Key Handling EXPORT_RSA Ciphers Downgrade MitM (XRX15AP) (FREAK)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote multi-function device is affected by a man-in-the-middle
vulnerability.

Description :

According to its model number and software version, the remote Xerox
WorkCentre 6400 device is affected by a security feature bypass
vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys),
due to the support of weak EXPORT_RSA cipher suites with keys less
than or equal to 512 bits. A man-in-the-middle attacker may be able to
downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which
can be factored in a short amount of time, allowing the attacker to
intercept and decrypt the traffic.

See also :

http://www.nessus.org/u?ff70a70b
https://www.smacktls.com/#freak

Solution :

Apply the appropriate cumulative update as described in the Xerox
security bulletin in the referenced URL.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 87325 ()

Bugtraq ID: 71936

CVE ID: CVE-2015-0204

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now