This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote service encrypts traffic using a protocol with known
The remote service accepts connections encrypted using SSL 2.0 and/or
SSL 3.0. These versions of SSL reportedly suffer from several
cryptographic flaws. An attacker may be able to exploit these flaws to
conduct man-in-the-middle attacks or to decrypt communications between
the affected service and clients.
NIST has determined that SSL 3.0 is no longer acceptable for secure
communications. As of the date of enforcement found in PCI DSS v3.1,
any version of SSL will not meet the PCI SSC'S definition of 'strong
See also :
Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.0 or higher instead.
Risk factor :
Medium / CVSS Base Score : 5.0
Family: Service detection
Nessus Plugin ID: 20007 ()
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.