Weak RSA key exchanges size despite registry key added

KelvinL 1 Reputation point
2022-07-28T19:21:48.057+00:00

I got a "Weak SSL/TLS Key Exchange" vulnerability in my Qulays report on a Windows 2016 server.

I manually added "ClientMinKeyBitLength" and "Server MinKeyBitLength" KEY and set them to 2048 bits in HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\KeyExchangeAlgorithms\PKCS (I did restart it again after I created the above keys)

https://learn.microsoft.com/en-us/windows-server/security/tls/tls-registry-settings

I re-ran the scan after restarting and I still get the same vulnerablilty despite the fact that I have manually added the above keys.

Can someone help? Thank you.

Windows for business | Windows Server | User experience | Other
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Shawn Marshall 1 Reputation point
    2022-08-24T14:45:25.447+00:00

    I've only seen the setting for ClientMinKeyBitLength and not ServerMinKeyBitLength for RSA. I believe ServerMinKeyBitLength is for DHE.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.