How to disable SHA1 and CBC mode cipher encryption.
search cancel

How to disable SHA1 and CBC mode cipher encryption.


Article ID: 191818


Updated On:


CA Virtual Privilege Manager CA Privileged Identity Management Endpoint (PIM)


VA finding on port 8161 ActiveMQ

SSL Medium Strength Cipher Suites Supported (SWEET32)

The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.

Please advise how to disable SHA1 and CBC mode cipher encryption and enable CTR or GCM cipher mode encryption.


Release : 14.0 and 14.1

Component : CA ControlMinder / PAMSC Server


This is a Vulnerability.


Follow these steps to mitigate the SWEETY32 attack.

Pre-requisite : jdk 1.8 version

1) Navigate to folder(or similar) C:\jdk1.8.0\jre\lib\security

2) Open

3) edit the line that contains "jdk.tls.disabledAlgorithms"

4) Merge these values to existing ones "SSLv3, DES, DESede, RC4, MD5withRCA"

5) Restart ActiveMQ service and Web Server