SSLv2 And SSLv3 Vulnerabilities Are Observed Even After Disabling SSLv2 And SSLv3.
(Doc ID 2262686.1)
Last updated on AUGUST 05, 2019
Applies to:Oracle API Gateway - Version 126.96.36.199.0 and later
Information in this document applies to any platform.
On Oracle API Gateway 188.8.131.52.0 base version, SSLv2 and SSLv3 were disabled using the below steps:
Listeners -> Ports -> https interface -> Advanced (SSL) tab
checked the check boxes:
Do not use the SSLv2 protocol
Do not use the SSLv3 protocol
Even after the changes, on testing, the below vulnerabilities are observed:
1. drown attached (SSLv2 supported)
2. SSL 2.0 deprecated protocol
3. poodle attack (SSLv3 supported)
Are there any other configuration changes necessary for the Gateway to disable SSLv2 and SSLv3?
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document