SSL Version 2 and 3 Protocol Detection

This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.

Synopsis :

The remote service encrypts traffic using a protocol with known

Description :

The remote service accepts connections encrypted using SSL 2.0 and/or
SSL 3.0. These versions of SSL are affected by several cryptographic
flaws. An attacker can exploit these flaws to conduct
man-in-the-middle attacks or to decrypt communications between the
affected service and clients.

NIST has determined that SSL 3.0 is no longer acceptable for secure
communications. As of the date of enforcement found in PCI DSS v3.1,
any version of SSL will not meet the PCI SSC'S definition of 'strong

See also :

Solution :

Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.1 (with approved cipher suites) or higher instead.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: Service detection

Nessus Plugin ID: 20007 ()

Bugtraq ID:


Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial