SSL RC4 Cipher Suites Supported (Bar Mitzvah)

Low Nessus Network Monitor Plugin ID 7282


The remote host supports the use of the RC4 cipher.


The remote host supports the use of RC4 in one or more cipher suites. The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.


Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

See Also

Plugin Details

Severity: Low

ID: 7282

Version: 1.0

Family: Generic

Published: 2017/08/29

Updated: 2018/08/16

Nessus ID: 65821

Risk Information

Risk Factor: Low

CVSS v2.0

Base Score: 2.6

Temporal Score: 2.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:TF/RC:ND

Vulnerability Information

Vulnerability Publication Date: 2015/03/31

Reference Information

CVE: CVE-2013-2566

BID: 58796