This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote device is using a weak hashing algorithm.
The self-signed certificate is signed with MD5, a depreciated and weak
signing algorithm. An attacker can decrypt and decipher keys hashed
with this algorithm.
See also :
Asset owners should obtain a signed web certificate from a certificate
Risk factor :
Medium / CVSS Base Score : 4.3