SSL Certificate Chain Contains Unnecessary Certificates

info Nessus Plugin ID 56472
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The X.509 certificate chain used by this service contains certificates that aren't required to form a path to the CA.

Description

At least one of the X.509 certificates sent by the remote host is not required to form a path from the server's own certificate to the CA. This may indicate that the certificate bundle installed with the server's certificate is for certificates lower in the certificate hierarchy.

Some SSL implementations, often those found in embedded devices, cannot handle certificate chains with unused certificates.

Solution

Remove unnecessary certificates from the certificate chain.

See Also

http://www.ietf.org/rfc/rfc4346.txt

Plugin Details

Severity: Info

ID: 56472

File Name: ssl_unused_certs.nasl

Version: Revision: 1.2

Type: remote

Family: General

Published: 10/12/2011

Updated: 1/17/2012

Dependencies: ssl_certificate_chain.nasl

Vulnerability Information

Required KB Items: SSL/Chain/Unused