CVSS Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
The TLS session resumption functionality is misconfigured. This opens attackers the possibility to steal existing TLS sessions from other users.
Generally, the TLS session resumption functionality speeds up client reconnections, as no full TLS handshake needs to take place. Instead a value known from a previous session is used to verify the authenticity of the connection. If the server does not rotate or renew its secrets properly, the session resumption breaks perfect forward secrecy.
To disable TLS session resumption, follow one of our guides. There exist further possibilities to harden the session resumption feature, but are based on scheduled restarts of the webserver. Relate the "Further Reading" for more information.
On Apache you need insert the SSLOpenSSLConfCmd directive into the virtual host configuration in /etc/apache2/sites-enabled/domain.conf or /etc/httpd/sites-enabled/domain.conf:
SSLOpenSSLConfCmd Options -SessionTicket
For Nginx, update the configuration file which is usually located at /etc/nginx/nginx.conf, /etc/nginx/sited-enabled/yoursite.com (Ubuntu / Debian) or /etc/nginx/conf.d/nginx.conf (RHEL / CentOS). Add thessl_session_ticketsdirective to the server section:
index index.html index.htm;