Lack Of forward Secrecy
Lack of Forward Secrecy
Overview of the Vulnerability
Forward secrecy uses temporary keys for the exchange of information between two parties. If a server's private key is compromised the session is still secure as it uses ephemeral keys for the exchange. When the application lacks forward secrecy, these security guarantees will rely solely on a public and private key interaction. An attacker will only require a private key to decrypt the data in transit.
Business Impact
Lack of forward secrecy can lead to reputational damage for the business due to a loss in confidence and trust by users who identify that there isn’t any forward secrecy.
Steps to Reproduce
Run a tool such as SSLScan, TestSLL, or SSLyze to scan the SSL/TLS configuration
Observe the results showing the lack of forward secrecy:
{{value}}
Proof of Concept (PoC)
The screenshot below demonstrates the use of a cipher suite with lack of forward secrecy:
{{screenshot}}
Recommendation(s)
It is recommended that only strong cipher suites are supported. As a guideline, the following cipher suites are recommended:
Ciphers such as ECDHE and DHE, which use perfect forward secrecy key exchange
Ciphers that use SHA256
AES-GCM is preferred for authentication ciphers. These are only available when TLS1.2 and TLS1.3 are in use
For more information, please see:
Last updated