NRPE Agent Vulnerabilities
Posted: Wed Jan 22, 2020 5:39 am
Nagios NRPE/nsclient Agents are installed on all our servers and communicate over port 5666 to the Nagios servers.
we have 2 nagios servers version 5.6.5 and we are worried about the below vulnerabilities:
4.2.1. TLS/SSL Server Supports Anonymous Cipher Suites with no Key Authentication (ssl-anon-ciphers) 4.2.2. TLS/SSL Server Supports DES and IDEA Cipher Suites (ssl-des-ciphers)
4.2.3. TLS/SSL Server Supports Export Cipher Algorithms (ssl-export-ciphers)
4.2.5. TLS/SSL Birthday attacks on 64-bit block ciphers (SWEET32) (ssl-cve-2016-2183-sweet32)
4.2.6. TLS/SSL Server Supports RC4 Cipher Algorithms (CVE-2013-2566) (rc4-cve-2013-2566) 4.2.7. TLS/SSL Server is enabling the BEAST attack (ssl-cve-2011-3389-beast)
4.2.8. TLS/SSL Server is enabling the POODLE attack (sslv3-cve-2014-3566-poodle)
4.2.9. TLS/SSL Server Supports SSLv3 (sslv3-supported)
4.2.10. TLS Server Supports TLS version 1.0 (tlsv1_0-enabled)
could you please let me know the remediation of the above Vulnerability and when the fix will be implemented.
if the fix includes agent version upgrade then do let us know how can we upgrade the agents on all the server without any downtime.
we have 2 nagios servers version 5.6.5 and we are worried about the below vulnerabilities:
4.2.1. TLS/SSL Server Supports Anonymous Cipher Suites with no Key Authentication (ssl-anon-ciphers) 4.2.2. TLS/SSL Server Supports DES and IDEA Cipher Suites (ssl-des-ciphers)
4.2.3. TLS/SSL Server Supports Export Cipher Algorithms (ssl-export-ciphers)
4.2.5. TLS/SSL Birthday attacks on 64-bit block ciphers (SWEET32) (ssl-cve-2016-2183-sweet32)
4.2.6. TLS/SSL Server Supports RC4 Cipher Algorithms (CVE-2013-2566) (rc4-cve-2013-2566) 4.2.7. TLS/SSL Server is enabling the BEAST attack (ssl-cve-2011-3389-beast)
4.2.8. TLS/SSL Server is enabling the POODLE attack (sslv3-cve-2014-3566-poodle)
4.2.9. TLS/SSL Server Supports SSLv3 (sslv3-supported)
4.2.10. TLS Server Supports TLS version 1.0 (tlsv1_0-enabled)
could you please let me know the remediation of the above Vulnerability and when the fix will be implemented.
if the fix includes agent version upgrade then do let us know how can we upgrade the agents on all the server without any downtime.