CCE-94561-8Platform: cpe:/a:oracle:jre:1.8.0 | Date: (C)2021-06-15 (M)2023-07-04 |
Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found revoked on a CRL or via Online Certificate Status Protocol (OCSP) should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service.
Ensuring users cannot change these settings assures a more consistent security profile.
Parameter:
[yes/no]
Technical Mechanism:
If the system is on the SIPRNet, this requirement is NA.
Navigate to the system-level "deployment.properties" file for JRE.
Add the key "deployment.security.validation.ocsp=true" to the "deployment.properties" file.
Add the key "deployment.security.validation.ocsp.locked" to the "deployment.properties" file.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.0 | Attack Vector: NETWORK |
Exploit Score: 2.2 | Attack Complexity: HIGH |
Impact Score: 4.7 | Privileges Required: NONE |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: LOW |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:60293 |