How to remediate – SSH Algorithms and Languages Supported 1. Introduction The SSH Algorithms and Languages Supported vulnerability means an SSH server is listening for connections on a network...
How to remediate – SSH Compression Error Checking 1. Introduction SSH Compression Error Checking affects systems running SSH software that supports compression algorithms but experiences connection failures when...
How to remediate – SSH Protocol Versions Supported 1. Introduction The SSH Protocol Versions Supported vulnerability means an SSH server is running on a system, potentially allowing older,...
How to remediate – SSH Rate Limited Device 1. Introduction The SSH Rate Limited Device vulnerability means a networking device is limiting how many times someone can try...
How to remediate – SSL Certificate Chain Contains RSA Keys Less Than 2048 bits (P… 1. Introduction The SSL Certificate Chain Contains RSA Keys Less Than 2048 bits vulnerability means that a service is using...
How to remediate – SSL Certificate Chain Contains Unnecessary Certificates 1. Introduction The SSL Certificate Chain Contains Unnecessary Certificates vulnerability means the server is sending more certificates than needed for...
How to remediate – SSL Certificate Chain Contains Weak RSA Keys 1. Introduction The SSL Certificate Chain Contains Weak RSA Keys vulnerability means that the service is using X.509 certificates with...
How to remediate – SSL Certificate Chain Not Sorted 1. Introduction The SSL Certificate Chain Not Sorted vulnerability means the order of certificates in a service’s X.509 chain is...
How to remediate – SSL Certificate ‘commonName’ Mismatch 1. Introduction 2. Technical Explanation The root cause of this issue is a misconfiguration where an SSL certificate’s ‘commonName’ (CN)...
How to remediate – SSL Certificate Expiry 1. Introduction SSL Certificate Expiry means the digital certificate used to secure a website’s connection has become invalid. This is...