I am investigating potential false positives with two OpenVAS vulnerability tests and would appreciate guidance on proper investigation methodology.
Issue Description
I am seeing detections from these two NVTs on a target behind CDN:
-
SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection
-
SSL/TLS: Report Vulnerable Cipher Suites for HTTPS (specifically SWEET32-vulnerable 3DES ciphers)
Multiple independent verification attempts using different tools and methods have failed to reproduce those findings.
-
Target is behind CDN with modern TLS configuration
-
Other similar targets with “virtually identical” CDN configurations do not show these vulnerabilities.
Are there known scenarios where OpenVAS might detect TLS issues on CDN origin servers rather than the presented CDN edge configuration?
What’s the recommended approach for investigating potential false positives with TLS/SSL tests in CDN environments?
Are there specific QoD settings or scan parameters that might affect the reliability of these detections behind CDNs?
Has anyone encountered similar scenarios with TLS/SSL detection ? Any guidance on investigation methodology or known edge cases would be greatly appreciated.
If not, how could I disable those VT testings?