AnsweredAssumed Answered

QID 38605 : SSL/TLS Server Factoring RSA Export Keys (FREAK) vulnerability

Question asked by Ashish Sharma on Dec 17, 2018
Latest reply on Jan 4, 2019 by Keith Shaw

Can anyone help me to fix this vulnerability?

As per the Solution provided by Qualys: "Disable RSA_EXPORT cipher suites.
Do not use temporary RSA key multiple times"

 

and Results: "Public key source key size
Public key in certificate 1024(bits)
Temporary RSA key 512(bits)#"


I am not able to identify where we have to make the changes to fix this vulnerability.

Outcomes