Vulnerabilities on Active Directory Server 2012R2

Anonymous
2024-01-24T11:18:46+00:00

Hi,

we have found some vulnerabilities on Active Directory server- Windows Server 2012R2. We troubleshoot to clear following points but not resolved. If you have expertise person in Active Directory domain controller level please let us know. We will pay you if issue resolved.

Please find the following issue points:-

  1. Taken action:- Still result are showing False TLS 1.0 & 1.1 on server after disabled TLS 1.0 & 1.1 on Registry (Using Port:- 636, 3269 & 4706) Vulnerabilities Desc:- TLS Version 1.0 & 1.1 Protocol Deprecated
  2. 1)      Vulnerabilities Desc:- SSL Certificate Signed Using Weak Hashing Algorithm (The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service. Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm. Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been ignored.)                      Taken Action:- We have tried to AD cetificate protocol tranfer from SHA-1 to SHA-512 but issue not resolved.
Windows for business Windows Server Directory services Other

Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question. To protect privacy, user profiles for migrated questions are anonymized.

0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Anonymous
    2024-01-25T03:00:51+00:00

    Hi Anil,

    I understand your concerns about vulnerabilities on Active Directory servers. Here are some suggestions that may help:

    Issue 1: TLS 1.0 and 1.1 protocols are deprecated Even after disabling TLS 1.0 and 1.1 in the registry, they are still detected on the server. This may be due to some services or applications still using these deprecated protocols. You may want to check your server configuration and make sure all services and applications have been updated to use more secure protocols, such as TLS 1.2 or TLS 1.3.

    Issue 2: SSL certificate signed with a weak hash algorithm You have tried moving the AD certificate protocol from SHA-1 to SHA-512, but the problem persists. This may be due to the fact that the certificates in your chain are still using SHA-1. Make sure all certificates, including root and intermediate certificates, use strong hashing algorithms. Also, make sure your server is configured correctly to use the new certificate chain.

    Please note that these are general recommendations and the exact solutions may vary based on your specific situation. I hope this information is useful to you!

    reference document:

    (1) How to disable TLS 1.0 in Windows Server 2012R2

    https://serverfault.com/questions/1010635/how-to-disable-tls-1-0-in-windows-server-2012r2.

    (2)How to disable TLS 1.0 in Windows 2012 RDP

    https://serverfault.com/questions/733994/how-to-disable-tls-1-0-in-windows-2012-rdp.

    (3) SSL certificate signed using weak hash algorithm

    https://answers.microsoft.com/en-us/windows/forum/all/ssl-certificate-signed-using-weak-hashing/cfdc8dd2-d260-4a3b-a078-e52fb48c7859.

    Best regards

    Qiuyang

    0 comments No comments