Invicti detected that weak ciphers are enabled during secure communication (SSL).
You should allow only strong ciphers on your web server to protect secure communication with your visitors. However, it is possible that the reported weak ciphers are not a concern in your specific environment due to factors such as serverless architectures, managed services, or cloud-provider-controlled configurations that do not allow modification of cipher settings.
Attackers might decrypt SSL traffic between your server and your visitors.
Configure your web server to disallow using weak ciphers. Please consider following when selecting ciphers:
If your environment is serverless or managed by a cloud provider, you may consider marking this vulnerability as a Accepted Risk.
If further validation is needed, ensure that your web server configuration is reviewed and that only strong ciphers are enabled. Follow the configuration steps below to secure your communication.
httpd.conf
.SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4regedt32
or type regedit
, and then click OK.HKLMSYSTEMCurrentControlSetControlSecurityProviders
Disable-TlsCipherSuite
powershell command to disable certain ciphers.Disable-TlsCipherSuite -Name "TLS_RSA_WITH_AES_256_CBC_SHA"To get a formatted list of ciphers, you can use the following command.Get-TlsCipherSuite | Format-Table NameYou can search and find all vulnerabilities