Check: CASA-VN-000550
Cisco ASA VPN STIG:
CASA-VN-000550
(in versions v1 r3 through v1 r1)
Title
The Cisco ASA remote access VPN server must be configured to use TLS 1.2 or higher to protect the confidentiality of remote access connections. (Cat I impact)
Discussion
Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol. NIST SP 800-52 provides guidance for client negotiation on either DoD-only or public-facing servers.
Check Content
Verify the TLS ASA is configured to use TLS 1.2 or higher as shown in the example below. ssl server-version tlsv1.2 dtlsv1.2 Note: ASA supports TLS version 1.2 starting from software version 9.3.1 for secure message transmission for Clientless SSL VPN and AnyConnect VPN. If the ASA is not configured to use TLS 1.2 or higher to protect the confidentiality of sensitive data during transmission, this is a finding.
Fix Text
Configure the ASA to use TLS 1.2 or higher as shown in the example below. ASA1(config)# ssl server-version tlsv1.2 dtlsv1.2
Additional Identifiers
Rule ID: SV-239975r666331_rule
Vulnerability ID: V-239975
Group Title: SRG-NET-000062-VPN-000200
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000068 |
The information system implements cryptographic mechanisms to protect the confidentiality of remote access sessions. |
Controls
Number | Title |
---|---|
AC-17 (2) |
Protection Of Confidentiality / Integrity Using Encryption |