Azure Web App service flagged for "TLS Protocol Session Renegotiation Security Vulnerability"

Vijay yadav 31 Reputation points
2022-04-19T21:25:52.727+00:00

Hi,

We have started using a Azure Web App service for one of the Nodejs app on windows with code.
Our security team has run a penetration testing , using Qualys. The report flagged the Web App to be vulnerable for - TLS Protocol Session Renegotiation Security Vulnerability. Here is the snippet of the report.

How should we fix/explain this on Web app service?

Threat
Transport Layer Security (TLS) is a cryptographic protocol that provides security for communications over networks at the Transport Layer.
TLS protocol is prone to a security vulnerability that allows for man-in-the-middle attacks. Note that this issue does not allow attackers to decrypt encrypted data
Specifically, the issue exists in a way applications handle the session renegotiation process and may allow attackers to inject arbitrary plaintext into the beginning
of application protocol stream. The attack has been confirmed to work with HTTP as the application protocol but it is believed to be also possible with other
protocols that are layered on TLS.
Impact
In case of the HTTP protocol used with the vulnerable TLS implementation, this attack is carried out by intercepting 'Client Hello' requests and then forcing
session renegotiation. An unauthorized attacker can then cause the webserver to process arbitrary requests that would otherwise require valid client side
certificate for authorization. Please note that the attacker will not be able to gain direct access to the server response.
A proof of concept attacks have been demonstrated where the user credentials were extracted using this vulnerability.
Mitigating factors: To successfully exploit this vulnerability a full man-in-the-middle control of the TCP connection is required. The attacker needs to accept the
TCP connection from the client and establish a new connection to the server.
Solution
For Microsoft Windows, refer to MS10-049 for further information.
For Cisco products refer to Document ID:1454786328728104 for further information.
Disable renegotiation completely.
Workaround:
OpenSSL has provided a version (0.9.8l) that has a workaround. Please refer to OpenSSL Change Log (Changes between 0.9.8k and 0.9.8l Section) to obtain
additional details.
Microsoft has provided the following workaround:

  • Enable SSLAlwaysNegoClientCert on IIS 6 and above: Web servers running IIS 6 and later that are affected because they require mutual authentication by
    requesting a client certificate, can be hardened by enabling the SSLAlwaysNegoClientCert setting. This will cause IIS to prompt the client for a certificate upon the
    initial connection, and does not require a server-initiated renegotiation.
Microsoft Defender for Cloud
Microsoft Defender for Cloud
An Azure service that provides threat protection for workloads running in Azure, on-premises, and in other clouds. Previously known as Azure Security Center and Azure Defender.
1,201 questions
Azure App Service
Azure App Service
Azure App Service is a service used to create and deploy scalable, mission-critical web apps.
6,911 questions
{count} votes

3 answers

Sort by: Most helpful
  1. Grmacjon-MSFT 16,186 Reputation points
    2022-05-19T16:26:19.82+00:00

    Hi,

    UPDATE: As of 5/31/22 this issue has been resoloved. Secure or Insecure Client-Initiated Renegotiation support, related to the vulnerabilities, has been disabled across all App Services. For more info please see Suwat's answer below.

    This is a known issue. The App Service engineering team is working to roll out a fix that should be completed by end of May 2022.
    If you need your app service to be mitigated before that time, please feel free to us an email at azcommunity@microsoft.com with the subject "ATTN: Grace" and in the body of the email include your sitenames and Azure Subscription ID.

    We will update this thread if there are have additional updates to share. We appreciate your patience as we work to resolve this issue.

    Best,
    Grace

    2 people found this answer helpful.

  2. Jose Lopez 21 Reputation points
    2022-05-26T16:15:19.233+00:00

    Hi,

    I was wondering if there are any further updates on this?

    Also, is there any official comm where Microsoft acknowledges this issue?

    Thanks

    2 people found this answer helpful.
    0 comments No comments

  3. Suwat Bodin 36 Reputation points Microsoft Employee
    2022-05-28T15:41:16.517+00:00

    App Services team has mitigated the issue. Secure or Insecure Client-Initiated Renegotiation support, related to the vulnerabilities, has been disabled across all App Services. If you still encounter the issue, please file a ticket and we will look into it. Please do not confuse with typical Secure Renegotiation which has been and continues to be supported. Make sure to use scan tools (such as ssllabs) to perform the scan since certain tools may not report all types of renegotiation.

    1 person found this answer helpful.