Hello,
how do I resolve to avoid use of medium strength ciphers?
SSL Medium Strength Cipher Suites Supported (SWEET32)
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.
SSL Medium Strength Cipher
Suites Supported
(SWEET32)
Medium 5.0 Reconfigure the affected application if possible to avoid use of medium strength ciphers.
1 Affected Host(s): 162.241.152.48
Initial Detection: 2021-10-04 19:40 UTC
Latest Detection: 2021-10-08 21:26 UTC
Description: The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as
any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
SSL RC4 Cipher Suites Supported
(Bar Mitzvah)
Medium 5.0 Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM
suites subject to browser and web server support.
1 Affected Host(s): 162.241.152.48
Initial Detection: 2021-10-04 19:40 UTC
Latest Detection: 2021-10-08 21:26 UTC
Description: The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.
how do I resolve to avoid use of medium strength ciphers?
SSL Medium Strength Cipher Suites Supported (SWEET32)
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.
SSL Medium Strength Cipher
Suites Supported
(SWEET32)
Medium 5.0 Reconfigure the affected application if possible to avoid use of medium strength ciphers.
1 Affected Host(s): 162.241.152.48
Initial Detection: 2021-10-04 19:40 UTC
Latest Detection: 2021-10-08 21:26 UTC
Description: The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as
any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
SSL RC4 Cipher Suites Supported
(Bar Mitzvah)
Medium 5.0 Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM
suites subject to browser and web server support.
1 Affected Host(s): 162.241.152.48
Initial Detection: 2021-10-04 19:40 UTC
Latest Detection: 2021-10-08 21:26 UTC
Description: The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.