Plantronics + Polycom. Now together as Poly Logo

RealPresence DMA Vulnerability Detection Server Temporary Key Size: 1024 bits

Occasional Visitor

RealPresence DMA Vulnerability Detection Server Temporary Key Size: 1024 bits

Hi, everyone.

 

A security scan was run in the infrastructure and appointed the following vulnerability at DMA:

Vulnerability Detection Result

Server Temporary Key Size: 1024 bits

Service (Port) Threat Level

5061/tcp Medium

8843/tcp Medium

443/tcp Medium

8443/tcp Medium

 

How can I solved this? And if I change something, could it cause any side effects in RPG/RPD/RPMobile?

 

The option was already selected -> Refuse TLS connections with DHE key size less than: 2048

System Version: 10.0.0_P2_Build_8528

 

Best regards

Message 1 of 2
1 REPLY 1
Highlighted
Regular Advisor

Re: RealPresence DMA Vulnerability Detection Server Temporary Key Size: 1024 bits

directly below that reuse tls connection drop down you referred to in your post, there are ciphers you can disable for Management and Signaling. I had to disable a bunch of weak ciphers. Other than making infosec happy, it created an issue with RPMoblie?Desktop authenticating which was fixed 10.0.0 P4 Build 9485

Message 2 of 2