This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.
An SSL certificate in the certificate chain has been signed using a
weak hash algorithm.
The remote service uses an SSL certificate chain that has been signed
using a cryptographically weak hashing algorithm - MD2, MD4, or MD5.
These signature algorithms are known to be vulnerable to collision
attacks. In theory, a determined attacker may be able to leverage
this weakness to generate another certificate with the same digital
signature, which could allow the attacker to masquerade as the
Note that certificates in the chain that are contained in the Nessus
CA database have been ignored.
See also :
Contact the Certificate Authority to have the certificate reissued.
Risk factor :
Medium / CVSS Base Score : 4.0
CVSS Temporal Score : 3.5
Public Exploit Available : true
Nessus Plugin ID: 35291 ()
Bugtraq ID: 1184933065
CVE ID: CVE-2004-2761
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.