Certificate is Signed Using a Weak Signature Algorithm
Summary#
Invicti detected that a certificate is signed using a weak signature algorithm.
The weak signature algorithm is known to be cryptographically weak and vulnerable to collision attacks.
Impact#
Attackers can observe the encrypted traffic between your website and its visitors by leveraging the use of this vulnerability.
Remediation#
You'll need to generate a new certificate request, and get your CA to issue you a new certificate using SHA-2.