Recently I carried on N/W Scan on an IP range using Nessus. Of all the vulnerabilities that Nessus found, there was "SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)" also.
This was found on an IP which I later found to be an Access Manager.
However, the company(maker of the Access Manager) have released an advisory saying that they are not vulnerable to POODLE.
To confirm the POODLE vulnerability found by Nessus, I tried using NMAP POODLE script.
Unfortunately it didn't gave any result.
Debug mode for NMAP gives the following output for NMAP script:
NSE: rpc-grind: isRPC didn't receive response.
NSE: Target port {port} is not a RPC port.
NSE: Finished rpc-grind against {IP}:{PORT}.
NSE: Finished skypev2-version against {IP}:{PORT}.
Completed NSE at 23:49, 30.02s elapsed
Next I tried SSLScan. It gave the below result:
Accepted SSLv3 128 bits ADH-AES128-SHA
Accepted SSLv3 168 bits ADH-DES-CBC3-SHA
Accepted SSLv3 56 bits ADH-DES-CBC-SHA
Accepted SSLv3 128 bits ADH-RC4-MD5
Accepted TLSv1 128 bits ADH-AES128-SHA
Accepted TLSv1 168 bits ADH-DES-CBC3-SHA
Accepted TLSv1 56 bits ADH-DES-CBC-SHA
Accepted TLSv1 128 bits ADH-RC4-MD5
I know that it shows weak cipher also, however coming back to POODLE issue, I noticed that it shows SSLv3 along with CBC mode. CVE-2014-3566 mentions "uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue"
So from the above, I take it that if SSLv3 along with CBC cipher suite is present then it would be vulnerable to POODLE. However as pointed out earlier, the advisory published mentions that it is not vulnerable to POODLE and also NMAP POODLE script doesn't work on it. I can't use other online sites for checking it as it is internal IP.
So just wanted to understand if it is POODLE issue or not?
My understanding that SSLv3 along with CBC cipher means vulnerable to POODLE, Is that correct or not?
Is there any other tool which can help me with identifying/validating the POODLE issue?
[Optional] Also as we are on topic of POODLE, can someone also explain regarding TLS POODLE. How to scan and validate it? What should be the recommendation to fix it?