Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
May 12, 2021 2:48:59 AM
Nov 11, 2014 6:10:08 AM
Analyzing endpoints for Qlik Sense Enterprise on Windows, using for example https://www.ssllabs.com/ssltest/analyze.html may indicate:
Qlik Sense Enterprise on Windows
Please review Qlik Sense Enterprise on Windows securityfor information on how to protect the Qlik Sense platform.
The security in Qlik Sense Enterprise does not depend only on the Qlik software. It also relies on the security and hardening of the environment that Qlik Sense operates in. This means that the security of, for example, the operating system and the cryptographic ciphers available have to be set up and configured to provide the security needed for Qlik Sense.
See Qlik Sense: TLS Support on what protocols and ciphers are supported in which version.
To mitigate POODLE attacks, one step is to completely disable SSLv3.0 on the server.
See Microsoft Security Advisory 3009008 for more instructions on how to accomplish this and the impact of doing so.
See Qlik Sense: TLS Support on what protocols and ciphers are supported in which version.
To mitigate POODLE attacks, one step is to completely disable all cipher suites with the string CBC. This needs to be carried out in the Windows OS.
Insecure renegotiation may be mitigated by disabling renegotiation. This can be done at the OS level by adding the following Windows registry key:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL]
"DisableRenegoOnServer"=dword:00000001
However, it is recommended to review all Schannel settings ( Secure Channel ) and that a Windows Administrator should configure it to meet their requirements.
See Qlik Sense: TLS Support on what protocols are supported in which version.
Note: Any changes at the OS level must be thoroughly tested as they may cause other software to no longer function as expected, or clients may be unable to communicate with the server. If any side effects are experienced, the changes should be reverted back to the original settings.
Hi Support-Team,
we have started to scan our servers with a security platform and a TLS padding oracle vulnerability is detected and triggered by proxy.exe.
To mitigate that threat we followed your advice by completely disabling all cipher suites with the string CBC.
That results in the behavior that qlik can no longer be accessed via the browser, so i revoked the settings and the threat has been reopened.
Do you have another solution to mitigate the Zombie POODLE / GOLDENDOODLE attack?
Best regards
Hello @Anwendungsmanagement
This will likely require more troubleshooting than we can do in an article. I recommend to first post your issue in our Qlik Sense Deployment and Management forum. Make certain to add the following:
All the best,
Sonja
All the best,
Sonja
@Sonja_Bauernfeind -We are using Nov 2023 Patch 9 and this Vulnerability has been flagged .Is Qlik going to address this in future version ? and what is permanent fix instead of work around by disabling the ciphers?
Thanks
Veer
Hello @veera_a
Please review the documented mitigations on how to address this. The disabling of ciphers is not a workaround, but the required solution, as this is where the vulnerability is present.
All the best,
Sonja