POODLE-Vulnerability/EN: Unterschied zwischen den Versionen
Zeile 1: | Zeile 1: | ||
+ | |||
=== {{:{{PAGENAME}}/Headline}} === | === {{:{{PAGENAME}}/Headline}} === | ||
Aktuelle Version vom 7. Mai 2020, 11:40 Uhr
Check for the POODLE vulnerability
If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.
Result positive | Not vulnerable to POODLE |
Result negativ | Vulnerable to POODLE |
Description | The server is vulnerable to a POODLE attack, which allows an attacker to decrypt the communication. |
Background | POODLE attack (Padding Oracle On Downgraded Legacy Encryption) is a serious security flaw in various internet protocols, whereby private data from clients and servers can be read via encrypted connections. |
Consequence | The server is vulnerable through a security flaw that allows an attacker to decrypt the communication. |
Solution/Tips | If vulnerability was reported, deactivate the outdated encryption protocol SSL3 on your server immediately! |