This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.
The remote service encrypts traffic using a protocol with known
The remote service accepts connections encrypted using TLS 1.0. This
version of TLS is affected by multiple cryptographic flaws. An
attacker can exploit these flaws to conduct man-in-the-middle attacks
or to decrypt communications between the affected service and clients.
All processing and third party entities - including Acquirers,
Processors, Gateways and Service Providers must provide a TLS 1.1 or
greater service offering by June 2016. All processing and third party
entities must cutover to a secure version of TLS (as defined by NIST)
effective June 2018.
Risk factor :
Medium / CVSS Base Score : 5.0
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now