How to remediate – SSL/TLS Server Cipher Suite Preference 1. Introduction The SSL/TLS Server Cipher Suite Preference vulnerability means a server’s list of preferred encryption methods could allow attackers...
How to remediate – SSL/TLS Server Cipher Suite Preference Not Detected 1. Introduction The SSL/TLS Server Cipher Suite Preference Not Detected vulnerability means a server isn’t actively choosing which encryption methods...
How to remediate – SSL/TLS Service Requires Client Certificate 1. Introduction 2. Technical Explanation This vulnerability occurs when a server is configured to mandate client certificate authentication during the...
How to remediate – SSL/TLS Services Support RC4 (PCI DSS) 1. Introduction The SSL/TLS Services Support RC4 vulnerability means a service on your systems is still allowing connections using the...
How to remediate – SSL/TLS Versions Supported 1. Introduction The SSL/TLS Versions Supported vulnerability shows which versions of the Secure Sockets Layer and Transport Layer Security protocols...
How to remediate – sslh Detection 1. Introduction sslh Detection identifies instances where a multiplexing service is running on a port. sslh allows both SSH and...
How to remediate – SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerabi… 1. Introduction The SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) allows an attacker to obtain sensitive information from...
How to remediate – STUN Detection 1. Introduction A STUN server is listening on the remote host. STUN, Session Traversal Utilities for NAT, helps applications discover...
How to remediate – Subversion Server Detection 1. Introduction Subversion Server Detection identifies instances of the Subversion version control software running on a remote host. Subversion manages...
How to remediate – StoneGate Firewall Client Authentication Detection 1. Introduction The StoneGate Firewall Client Authentication Detection vulnerability indicates a StoneGate firewall client is installed on a remote host....