The objective of this Knowledge Base article is to provide information on support for 3des-cbc or 3des-ctr algorithms in vCenter 8.0 U3.
vCenter 8.0 U3
In vCenter 8, specifically starting with version 8.0 Update 3, 3DES (Triple DES) algorithms like 3des-cbc and 3des-ctr are generally unsupported or disabled by default for most secure communication channels (TLS and SSH). This is due to 3DES being classified as a "weak" or "legacy" cipher (vulnerable to the Sweet32 attack). vSphere 8 has shifted toward more secure defaults, such as AES-GCM and AES-CTR.
To identify the currently used TLS profile for vCenter, please refer - Manage the TLS Profile of a vCenter Server Host
Note: Unlike TLS profile for ESXi host which could be managed by vSphere Configuration Profiles or esxcli commands, the vCenter Server profiles are managed via APIs
For security scanners reporting TLS ciphers as weak on vCenter Server ports 1514, 443, 5480, 5580, 636, 8084 and 9087 , please refer - Disabling TLS ciphers on vCenter