How to Buy
This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote host is affected by a man-in-the-middle vulnerability.
The remote device is running a software version known to be affected
by an OpenSSL related vulnerability. The flaw could allow a MiTM
attacker to decrypt or forge SSL messages by telling the service to
begin encrypted communications before key material has been exchanged,
which causes predictable keys to be used to secure future traffic.
See also :
There is currently no known solution.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.3
Public Exploit Available : true
Nessus Plugin ID: 76127 ()
Bugtraq ID: 67899
CVE ID: CVE-2014-0224
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.