EAP 773 - Seurity vulnerabilities

EAP 773 - Seurity vulnerabilities

EAP 773 - Seurity vulnerabilities
EAP 773 - Seurity vulnerabilities
2025-05-26 21:51:29 - last edited 2025-05-27 11:00:27
Model: EAP773  
Hardware Version: V1
Firmware Version: 1.0.14

Hi,

 

Our entreprise did a security assesment and the new EAP 773 has some vulnerabilities : 

 

High

SSL Medium Strength Cipher Suites Supported (SWEET32)

Description

The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.

Solution

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

Low

SSL Certificate Chain Contains RSA Keys Less Than 2048 bits

Description

At least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/Browser (CA/B) Forum, certificates issued after January 1, 2014 must be at least 2048 bits.

Some browser SSL implementations may reject keys less than 2048 bits after January 1, 2014. Additionally, some SSL certificate vendors may revoke certificates less than 2048 bits before January 1, 2014.

Note that Nessus will not flag root certificates with RSA keys less than 2048 bits if they were issued prior to December 31, 2010, as the standard considers them exempt.

Solution

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

 

 

 

Medium

SSL RC4 Cipher Suites Supported (Bar Mitzvah)

Description

The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.

If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.

Solution

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

 

Low

SSL Certificate Chain Contains RSA Keys Less Than 2048 bits

Description

At least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/Browser (CA/B) Forum, certificates issued after January 1, 2014 must be at least 2048 bits.

Some browser SSL implementations may reject keys less than 2048 bits after January 1, 2014. Additionally, some SSL certificate vendors may revoke certificates less than 2048 bits before January 1, 2014.

Note that Nessus will not flag root certificates with RSA keys less than 2048 bits if they were issued prior to December 31, 2010, as the standard considers them exempt.

Solution

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

 

Is it possible to fix those security issue of the EAP 773. We are running on version 1.0.14.

 

 

We also have a bunch of EAP 653 and they don't have this issue. There are running on version 1.1.3.

 

 

Thank your for your help,

 

 

Jonathan

 

 

 

 

  0      
  0      
#1
Options
1 Accepted Solution
Re:EAP 773 - Seurity vulnerabilities-Solution
2025-05-27 11:00:22 - last edited 2025-07-02 01:14:26

  @xwildx 

 

Thank you for your feedback.

 

This had been fixed in the next firmware version and the ETA is no later than next month.

 

ETA is provisional and actual delivery may vary depending on implementation conditions.

Recommended Solution
  0  
  0  
#3
Options
5 Reply
Re:EAP 773 - Seurity vulnerabilities
2025-05-27 00:36:29

  Here is the full report 

File:
Internal - Basic Network Scan_73os1p.pdfDownload
  0  
  0  
#2
Options
Re:EAP 773 - Seurity vulnerabilities-Solution
2025-05-27 11:00:22 - last edited 2025-07-02 01:14:26

  @xwildx 

 

Thank you for your feedback.

 

This had been fixed in the next firmware version and the ETA is no later than next month.

 

ETA is provisional and actual delivery may vary depending on implementation conditions.

Recommended Solution
  0  
  0  
#3
Options
Re:EAP 773 - Seurity vulnerabilities
2025-05-27 12:54:50

  @Vincent-TP thank you for the quick reply,

  0  
  0  
#4
Options
Re:EAP 773 - Seurity vulnerabilities
2025-07-01 11:59:43

@Vincent-TP It's later than month and still no new firmware even beta firmware. 

I am disappointed and will try another vendor that actively and regularly updates the firmware.

  0  
  0  
#5
Options
Re:EAP 773 - Seurity vulnerabilities
2025-07-02 01:13:07

Hi  @Pista24 

 

During the testing phase, we encountered several unexpected issues that are currently being addressed with high priority.

 

We appreciate your understanding regarding these necessary adjustments to our original schedule.

  0  
  0  
#6
Options