If an attacker gains access to shared cryptographic material, including default material, the attacker can reuse that material to impersonate the MySQL server or otherwise compromise its operations. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Generate new certificates, keys, and other cryptographic material as needed for each affected MySQL instance.