CCE-94566-7Platform: cpe:/a:oracle:jre:1.8.0 | Date: (C)2021-06-15 (M)2023-07-04 |
Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found revoked on a CRL or via Online Certificate Status Protocol (OCSP) should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service.
Ensuring users cannot change these settings assures a more consistent security profile.
Parameter:
[all_certificates/publisher_only/no_check]
Technical Mechanism:
If the system is on the SIPRNet, this requirement is NA.
Navigate to the system-level ���������deployment.properties��������� file for JRE.
The location of the deployment.properties file is defined in JRE Installation Directory \Lib\deployment.config
Add the key ���������deployment.security.revocation.check=ALL_CERTIFICATES��������� to the deployment.properties file.
Add the key ���������deployment.security.revocation.check.locked��������� to the deployment.properties file.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.0 | Attack Vector: NETWORK |
Exploit Score: 2.2 | Attack Complexity: HIGH |
Impact Score: 4.7 | Privileges Required: NONE |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: LOW |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:60299 |