CCE-94558-4Platform: cpe:/a:oracle:jre:1.8.0 | Date: (C)2021-06-15 (M)2023-07-04 |
Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found revoked on a CRL or via Online Certificate Status Protocol (OCSP) should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service.
Ensuring users cannot change these settings assures a more consistent security profile.
Parameter:
[yes/no]
Technical Mechanism:
If the system is on the SIPRNet, this requirement is NA.
Enable the "Check certificates for revocation using If the system is on the SIPRNet, this requirement is NA.
Enable the "Check certificates for revocation using Certificate Revocation Lists (CRL)" option.
Navigate to the system-level "deployment.properties" file for JRE.
Add the key "deployment.security.validation.crl=true" to the "deployment.properties" file.
Add the key "deployment.security.validation.crl.locked" to the "deployment.properties" file.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.0 | Attack Vector: LOCAL |
Exploit Score: 1.0 | Attack Complexity: HIGH |
Impact Score: 5.9 | Privileges Required: LOW |
Severity: HIGH | User Interaction: NONE |
Vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:60290 |