|SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)||The remote host allows SSL/TLS connections with one or more|
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections.
|Reconfigure the service to use a unique Diffie-Hellman moduli of 2048|
bits or greater.
|SSL Medium Strength Cipher Suites Supported (SWEET32)||The remote host supports the use of SSL ciphers that offer medium|
strength encryption. Nessus regards medium strength as any encryption
that uses key lengths at least 64 bits and less than 112 bits, or
else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength
encryption if the attacker is on the same physical network.
|To disable SHA1 and CBC mode cipher encryption and enable CTR or GCM cipher mode encryption.|
Component : CA ControlMinder