SSL RC4 Cipher Suite Vulnerability

This GPO is now linked at the regional levels and will automatically be applied to all Windows desktop and server Os’s in Active Directory.

BWTST has created a GPO, “DI-BWTST Disable RC4 Cipher“, that will mitigate the vulnerabilities associated with SSL RC4 Cipher Suite that has recently raised as a top concern.

Recent searches discovered a two-fold approach of a Microsoft HotFix and Registry changes. We have found that the Registry change will mitigate the vulnerability. The GPO will make these following changes:

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 128/128]
“Enabled”=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128]
“Enabled”=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 56/128]
“Enabled”=dword:00000000

These changes can also be done manually and may require a server reboot to complete.

USGS Security Assurance Team states:

RC4 Cipher: Nessus ID#65821     https://support.microsoft.com/en-us/kb/2868725

“USGS has 12,513 hosts with this Medium severity vulnerability. Roughly 9,835 of them are found on RDP port 3389. ITSOT is recommending that either a GPO, MECM, or IEM solution be developed to correct and maintain this issue nationally.”

Comments are closed.