Fixed in following releases- NSX 4.1.2.3 and above NSX 3.2.4
As a workaround we can disable ChaCha20-Poly1305 cipher. Refer to this KB for steps- https://knowledge.broadcom.com/external/article/323554/disable-weak-ciphers-on-nsx-manager.html
Additional Information
A successful attack has no observable impact on session secrecy or integrity and it only leads to a stalled connection; the reason is that, the attack requires an active Man-in-the-Middle (MITM) who can intercept and modify the connection's traffic. Basically, the attacker can only remove the initial messages on the secure channel without causing a MAC failure and therefore, prevents user authentication from proceeding.