TLS Version 1.0 Protocol Detection (PCI DSS)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.

Synopsis :

The remote service encrypts traffic using a protocol with known

Description :

The remote service accepts connections encrypted using TLS 1.0. This
version of TLS is affected by multiple cryptographic flaws. An
attacker can exploit these flaws to conduct man-in-the-middle attacks
or to decrypt communications between the affected service and clients.

Solution :

All processing and third party entities - including Acquirers,
Processors, Gateways and Service Providers must provide a TLS 1.1 or
greater service offering by June 2016. All processing and third party
entities must cutover to a secure version of TLS (as defined by NIST)
effective June 2018.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: Service detection

Nessus Plugin ID: 84470 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now