The SSL certificate for this service cannot be trusted. Description The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the serve...
Synopsis The remote server's SSL certificate has already expired. Description This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired. Solution Purchase or generate a new SSL certificate to replace the existing on...
Description The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine. Solution Purchase or generate a proper SSL certificate for this service. Plugin Details Severity:Medium ID:45411 File Name:ssl_cert_wrong_host.nasl ...
Some SSL implementations, notably Microsoft's, may consider this SSL chain to be invalid due to the length of one or more of the RSA keys it contains. Solution Replace the certificate in the chain with the weak RSA key with a stronger key, and reissue any certificates it signed. ...
File Name:ssl_self_signed_certificate.nasl Version:1.6 Type:remote Family:General Published:1/17/2012 Updated:6/14/2022 Supported Sensors:Nessus Risk Information CVSS Score Rationale:Score based on an analysis of the vulnerability by tenable. ...
The remote service uses an SSL certificate that has been signed using a cryptographically weak hashing algorithm - MD2. These algorithms are known to be vulnerable to collision attacks. In theory, a determined attacker may be able to leverage this weakness to generate another certificate with the ...
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with ...
The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits. DescriptionAt least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/...
SSL/TLS Certificate Signed Using Weak Hashing Algorithm DescriptionThe remote server uses an SSL/TLS certificate that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An ...