Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
36 |
19_tokyu_hikarie_20170118.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
119.75.229.147 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
294 |
H28-MOJ-Online-Nara-5-Seg-2-20161126-Endo_mq01q9.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
163.49.22.129 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
295 |
H28-MOJ-Online-Nara-5-Seg-2-20161126-Endo_mq01q9.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
163.49.22.129 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
296 |
H28-MOJ-Online-Nara-5-Seg-2-20161126-Endo_mq01q9.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
163.49.22.129 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
509 |
H28-MOJ-Online-Nara-5-Seg-3-20161126-Endo_6uyjrf.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
163.49.22.130 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
510 |
H28-MOJ-Online-Nara-5-Seg-3-20161126-Endo_6uyjrf.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
163.49.22.130 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
511 |
H28-MOJ-Online-Nara-5-Seg-3-20161126-Endo_6uyjrf.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
163.49.22.130 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
787 |
H28-MOJ-Online-Nara-7-Seg-1-20161126-Endo_nm0xzd.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.128.1 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
788 |
H28-MOJ-Online-Nara-7-Seg-1-20161126-Endo_nm0xzd.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.128.1 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
789 |
H28-MOJ-Online-Nara-7-Seg-1-20161126-Endo_nm0xzd.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.128.1 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1010 |
H28-MOJ-Online-Nara-7-Seg-2-20161126-Endo_2kfbtq.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.128.2 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1011 |
H28-MOJ-Online-Nara-7-Seg-2-20161126-Endo_2kfbtq.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.128.2 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1012 |
H28-MOJ-Online-Nara-7-Seg-2-20161126-Endo_2kfbtq.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.128.2 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1211 |
H28-MOJ-Online-Nara-8-Seg-1-20161126-Endo_qrnvlr.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.129.150 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1429 |
H28-MOJ-Online-Nara-8-Seg-2-20161126-Endo_j3uns1.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.129.34 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1631 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.129.33 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1632 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.129.33 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1633 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.129.33 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1634 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.129.33 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1635 |
H28-MOJ-Online-Nara-8-Seg-3-20161126-Endo_tdom56.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.129.33 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1830 |
H28-MOJ-Online-Nara-9-Seg-1-20161126-Endo_ilvrp0.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.130.5 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1831 |
H28-MOJ-Online-Nara-9-Seg-1-20161126-Endo_ilvrp0.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.130.5 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
1832 |
H28-MOJ-Online-Nara-9-Seg-1-20161126-Endo_ilvrp0.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.130.5 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2059 |
H28-MOJ-Online-Nara-9-Seg-2-20161126-Endo_ogdo2c.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.130.6 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2060 |
H28-MOJ-Online-Nara-9-Seg-2-20161126-Endo_ogdo2c.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.130.6 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2061 |
H28-MOJ-Online-Nara-9-Seg-2-20161126-Endo_ogdo2c.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.130.6 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2441 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.45 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2442 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.45 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2443 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.45 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2444 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.45 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2445 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.45 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2446 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.45 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2682 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.57 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2683 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.57 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2684 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.57 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2685 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.57 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2686 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.57 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2687 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.57 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2929 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.9 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2930 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.9 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2931 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.9 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2932 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.9 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
2933 |
H28-MOJ-Online-Nara-11-Seg-1-20161126-Endo_oxa90g.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.9 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3174 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.10 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3175 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.10 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3176 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.10 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3177 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.10 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3178 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.10 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3413 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.46 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3414 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.46 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3415 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.46 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3416 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.46 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3417 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.46 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3418 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.46 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3655 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.58 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3656 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.58 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3657 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.58 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3658 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.58 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3659 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.58 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3660 |
H28-MOJ-Online-Nara-11-Seg-2-20161126-Endo_rsvx6u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.58 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3902 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.11 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3903 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.11 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3904 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.11 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3905 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.11 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
3906 |
H28-MOJ-Online-Nara-11-Seg-3-20161126-Endo_v796ck.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.132.11 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4075 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.100 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4076 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.100 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4077 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.100 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4078 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.100 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4248 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.128 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4249 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.128 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4250 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.128 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4251 |
H28-MOJ-Online-Nara-12-Seg-1-20161126-Endo_57famk.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.128 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4439 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.130 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4440 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.130 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4441 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.130 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4442 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.130 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4610 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.25 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4611 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.25 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4612 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.25 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4613 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.25 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4780 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.26 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4781 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.26 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4782 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.26 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
4783 |
H28-MOJ-Online-Nara-12-Seg-2-20161126-Endo_l4bznj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.133.26 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5100 |
H28-MOJ-Online-Nara-13-Seg-1-20161126-Endo_9whfs5.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.134.53 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5101 |
H28-MOJ-Online-Nara-13-Seg-1-20161126-Endo_9whfs5.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.134.53 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5102 |
H28-MOJ-Online-Nara-13-Seg-1-20161126-Endo_9whfs5.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.134.53 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5103 |
H28-MOJ-Online-Nara-13-Seg-1-20161126-Endo_9whfs5.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.134.53 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5319 |
H28-MOJ-Online-Nara-13-Seg-2-20161126-Endo_0pcahr.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.134.54 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5320 |
H28-MOJ-Online-Nara-13-Seg-2-20161126-Endo_0pcahr.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.134.54 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5321 |
H28-MOJ-Online-Nara-13-Seg-2-20161126-Endo_0pcahr.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.134.54 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5322 |
H28-MOJ-Online-Nara-13-Seg-2-20161126-Endo_0pcahr.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.134.54 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5552 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.100 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5553 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.100 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5692 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.129 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5693 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.129 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5829 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.150 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5830 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.150 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5949 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.200 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
5976 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.202 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
6213 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.25 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
6214 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.25 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
6405 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.41 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
6577 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.45 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
6578 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.45 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
6727 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.53 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
6728 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.53 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
6900 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.57 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
6901 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.57 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7082 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.61 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7083 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.61 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7271 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.63 |
tcp |
9855 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7272 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.63 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7273 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.63 |
tcp |
8443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7475 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.65 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7476 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.65 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7649 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.68 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7860 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.69 |
tcp |
8093 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7861 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.69 |
tcp |
3994 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7862 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.69 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7863 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.69 |
tcp |
1433 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
8013 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.70 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
8050 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.87 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
8238 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.9 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
8432 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.10 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
8611 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.11 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
8747 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.131 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
8748 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.131 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
8881 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.201 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9051 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.26 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9052 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.26 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9207 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.42 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9379 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.46 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9380 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.46 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9528 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.54 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9529 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.54 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9703 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.58 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9704 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.58 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9864 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.62 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9865 |
H28-MOJ-Online-Nara-16-seg-2-20161126-soga_e6g03u.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.137.62 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
9987 |
H28-MOJ-Online-Nara-17-seg-1-20161126-soga_nryyhs.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.138.1 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
10288 |
H28-MOJ-Online-Nara-17-seg-1-20161126-soga_nryyhs.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.138.37 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
10407 |
H28-MOJ-Online-Nara-17-seg-2-20161126-soga_ng4omz.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.138.2 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
10595 |
H28-MOJ-Online-Nara-17-seg-2-20161126-soga_ng4omz.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.138.38 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
10796 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.151 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
10797 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.151 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
10798 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.151 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
10799 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.151 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
10800 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.151 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11130 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.33 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11131 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.33 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11132 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.33 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11133 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.33 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11134 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.33 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11261 |
H28-MOJ-Online-Nara-18-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.5 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11476 |
H28-MOJ-Online-Nara-18-seg-2-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.34 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11477 |
H28-MOJ-Online-Nara-18-seg-2-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.34 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11478 |
H28-MOJ-Online-Nara-18-seg-2-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.34 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11603 |
H28-MOJ-Online-Nara-18-seg-2-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.139.6 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11663 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.1 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11726 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.11 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11787 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.25 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11850 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.33 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11913 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.37 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
11975 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.41 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12036 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.45 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12097 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.5 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12159 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.53 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12222 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.61 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12285 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.65 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12346 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.67 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12407 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.69 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12468 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.71 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12531 |
H28-MOJ-Online-Nara-19-seg-1-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.9 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12793 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.10 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12855 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.2 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12918 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.26 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
12980 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.34 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13042 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.38 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13105 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.42 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13167 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.46 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13229 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.54 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13292 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.6 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13355 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.62 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13416 |
H28-MOJ-Online-Nara-19-seg-3-20161126-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.140.66 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13707 |
H28-MOJ-Online-Nara-23-seg-1-20161126-soga_0xbhqy.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.25 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13708 |
H28-MOJ-Online-Nara-23-seg-1-20161126-soga_0xbhqy.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.25 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13709 |
H28-MOJ-Online-Nara-23-seg-1-20161126-soga_0xbhqy.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.25 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13710 |
H28-MOJ-Online-Nara-23-seg-1-20161126-soga_0xbhqy.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.25 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13880 |
H28-MOJ-Online-Nara-23-seg-2-20161126-soga_qe2r2h.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.26 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13881 |
H28-MOJ-Online-Nara-23-seg-2-20161126-soga_qe2r2h.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.26 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13882 |
H28-MOJ-Online-Nara-23-seg-2-20161126-soga_qe2r2h.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.26 |
tcp |
6547 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
13883 |
H28-MOJ-Online-Nara-23-seg-2-20161126-soga_qe2r2h.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.26 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14039 |
H28-MOJ-Teikyo-Nara-2-Seg-1-20161128-Endo_59hwry.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.193.212 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14138 |
H28-MOJ-Teikyo-Nara-2-Seg-2-20161128-Endo_kqsom5.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.193.13 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14139 |
H28-MOJ-Teikyo-Nara-2-Seg-2-20161128-Endo_kqsom5.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.193.13 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14175 |
H28-MOJ-Teikyo-Nara-2-Seg-2-20161128-Endo_kqsom5.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.193.216 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14209 |
H28-MOJ-Teikyo-Nara-2-Seg-3-20161128-Endo_0xumzn.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.193.217 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14387 |
H28-MOJ-Teikyo-Nara-3-Seg-1-20161128-Endo_rjal60.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.194.212 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14421 |
H28-MOJ-Teikyo-Nara-3-Seg-1-20161128-Endo_rjal60.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.194.217 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14727 |
H28-MOJ-Teikyo-Nara-3-Seg-2-20161128-Endo_z7mvid.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.194.216 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14806 |
H28-MOJ-Teikyo-Nara-11-Seg-1-20161128-Endo_5sv454.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.195.213 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14840 |
H28-MOJ-Teikyo-Nara-11-Seg-1-20161128-Endo_5sv454.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.195.219 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
14875 |
H28-MOJ-Teikyo-Nara-11-Seg-2-20161128-Endo_janch2.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.195.218 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15067 |
H28-MOJ-Teikyo-Nara-12-Seg-1-20161128-Endo_ot6e6s.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.15 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15068 |
H28-MOJ-Teikyo-Nara-12-Seg-1-20161128-Endo_ot6e6s.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.15 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15069 |
H28-MOJ-Teikyo-Nara-12-Seg-1-20161128-Endo_ot6e6s.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.15 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15070 |
H28-MOJ-Teikyo-Nara-12-Seg-1-20161128-Endo_ot6e6s.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.15 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15107 |
H28-MOJ-Teikyo-Nara-12-Seg-1-20161128-Endo_ot6e6s.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.213 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15141 |
H28-MOJ-Teikyo-Nara-12-Seg-1-20161128-Endo_ot6e6s.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.219 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15325 |
H28-MOJ-Teikyo-Nara-12-Seg-2-20161128-Endo_oug55j.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.16 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15326 |
H28-MOJ-Teikyo-Nara-12-Seg-2-20161128-Endo_oug55j.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.16 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15327 |
H28-MOJ-Teikyo-Nara-12-Seg-2-20161128-Endo_oug55j.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.16 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15328 |
H28-MOJ-Teikyo-Nara-12-Seg-2-20161128-Endo_oug55j.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.16 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15366 |
H28-MOJ-Teikyo-Nara-12-Seg-2-20161128-Endo_oug55j.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.196.218 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15481 |
H28-MOJ-Teikyo-Nara-13-Seg-1-20161128-Endo_vv45dy.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.197.32 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15482 |
H28-MOJ-Teikyo-Nara-13-Seg-1-20161128-Endo_vv45dy.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.197.32 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15590 |
H28-MOJ-Teikyo-Nara-13-Seg-1-20161128-Endo_vv45dy.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.197.34 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15591 |
H28-MOJ-Teikyo-Nara-13-Seg-1-20161128-Endo_vv45dy.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.197.34 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15699 |
H28-MOJ-Teikyo-Nara-13-Seg-2-20161128-Endo_a7gs9h.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.197.33 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15700 |
H28-MOJ-Teikyo-Nara-13-Seg-2-20161128-Endo_a7gs9h.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.197.33 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15809 |
H28-MOJ-Teikyo-Nara-13-Seg-2-20161128-Endo_a7gs9h.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.197.35 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15810 |
H28-MOJ-Teikyo-Nara-13-Seg-2-20161128-Endo_a7gs9h.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.197.35 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15939 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.100 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15940 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.100 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
15941 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.100 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16070 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.129 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16071 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.129 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16072 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.129 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16201 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.25 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16202 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.25 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16203 |
H28-MOJ-Teikyo-Nara-14-Seg-1-20161128-Endo_nwkk0a.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.25 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16343 |
H28-MOJ-Teikyo-Nara-14-Seg-2-20161128-Endo_byojab.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.128 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16344 |
H28-MOJ-Teikyo-Nara-14-Seg-2-20161128-Endo_byojab.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.128 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16345 |
H28-MOJ-Teikyo-Nara-14-Seg-2-20161128-Endo_byojab.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.128 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16472 |
H28-MOJ-Teikyo-Nara-14-Seg-2-20161128-Endo_byojab.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.26 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16473 |
H28-MOJ-Teikyo-Nara-14-Seg-2-20161128-Endo_byojab.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.26 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16474 |
H28-MOJ-Teikyo-Nara-14-Seg-2-20161128-Endo_byojab.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.198.26 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16583 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.166 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16584 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.166 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16692 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.30 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16693 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.30 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16891 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.62 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16892 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.62 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
16893 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.62 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17007 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.66 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17008 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.66 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17122 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.68 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17123 |
H28-MOJ-Teikyo-Nara-15-Seg-1-20161128-Endo_gheygl.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.68 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17223 |
H28-MOJ-Teikyo-Nara-15-Seg-2-20161128-Endo_5usqei.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.31 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17224 |
H28-MOJ-Teikyo-Nara-15-Seg-2-20161128-Endo_5usqei.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.31 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17333 |
H28-MOJ-Teikyo-Nara-15-Seg-2-20161128-Endo_5usqei.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.67 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17334 |
H28-MOJ-Teikyo-Nara-15-Seg-2-20161128-Endo_5usqei.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.199.67 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17606 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.130 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17607 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.130 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17608 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.130 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17874 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.150 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17875 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.150 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
17876 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.150 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
18061 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.201 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
18091 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.203 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
18120 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.204 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
18150 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.208 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
18229 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.213 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
18264 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.218 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
18515 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.25 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
18516 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.25 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
18517 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.25 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
18931 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.61 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
19089 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.63 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
19413 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.129 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
19414 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.129 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
19415 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.129 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
19682 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.26 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
19683 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.26 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
19684 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.26 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
20103 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.64 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
20363 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.65 |
tcp |
9855 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
20364 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.65 |
tcp |
7099 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
20365 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.65 |
tcp |
3170 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
20366 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.65 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
20367 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.65 |
tcp |
49209 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
20830 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.69 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
20831 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.69 |
tcp |
1433 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
20965 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.70 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21101 |
H28-MOJ-Teikyo-Nara-17-seg-4-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.205 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21131 |
H28-MOJ-Teikyo-Nara-17-seg-4-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.209 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21165 |
H28-MOJ-Teikyo-Nara-17-seg-4-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.219 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21370 |
H28-MOJ-Teikyo-Nara-17-seg-4-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.62 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21573 |
H28-MOJ-Teikyo-Nara-17-seg-4-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.71 |
tcp |
8093 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21574 |
H28-MOJ-Teikyo-Nara-17-seg-4-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.71 |
tcp |
3994 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21575 |
H28-MOJ-Teikyo-Nara-17-seg-4-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.71 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21576 |
H28-MOJ-Teikyo-Nara-17-seg-4-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.71 |
tcp |
1433 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21612 |
H28-MOJ-Teikyo-Nara-17-seg-4-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.201.87 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21769 |
H28-MOJ-Teikyo-Nara-21-seg-1-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.1 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21870 |
H28-MOJ-Teikyo-Nara-21-seg-2-20161128-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.2 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21912 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.1 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
21955 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.10 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22061 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.15 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22104 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.20 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22146 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.22 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22189 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.25 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22240 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.3 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22282 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.32 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22324 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.34 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22367 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.63 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22410 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.65 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22454 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.66 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22497 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.68 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22540 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.69 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22623 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.11 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22703 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.16 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22746 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.2 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22789 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.21 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22832 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.26 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22875 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.33 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22918 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.35 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
22961 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.64 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
23004 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.202.67 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
23179 |
nessus_H28-MOJ-Teikyo-Nara-19-seg-1-20161128-soga_1720842268.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.203.212 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
23213 |
nessus_H28-MOJ-Teikyo-Nara-19-seg-1-20161128-soga_1720842268.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.203.217 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
23403 |
nessus_H28-MOJ-Teikyo-Nara-19-seg-2-20161128-soga_959935420.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.203.14 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
23404 |
nessus_H28-MOJ-Teikyo-Nara-19-seg-2-20161128-soga_959935420.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.203.14 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
23469 |
nessus_H28-MOJ-Teikyo-Nara-19-seg-2-20161128-soga_959935420.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.203.216 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
23629 |
H28-MOJ-Online-Funa-1-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
163.49.22.130 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
23630 |
H28-MOJ-Online-Funa-1-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
163.49.22.130 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
24389 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.1.150 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
24390 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.1.150 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
24391 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.1.150 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
24392 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.1.150 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
24644 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.1.33 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
24645 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.1.33 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
24646 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.1.33 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
24647 |
H28-MOJ-Online-Funa-4-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.1.33 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
24825 |
H28-MOJ-Online-Funa-4-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.1.34 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
24826 |
H28-MOJ-Online-Funa-4-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.1.34 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25031 |
H28-MOJ-Online-Funa-5-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.2.5 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25032 |
H28-MOJ-Online-Funa-5-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.2.5 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25200 |
H28-MOJ-Online-Funa-5-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.2.6 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25201 |
H28-MOJ-Online-Funa-5-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.2.6 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25536 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.12 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25537 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.12 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25538 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.12 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25539 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.12 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25756 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.13 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25757 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.13 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25758 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.13 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25759 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.13 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25979 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.45 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25980 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.45 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25981 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.45 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25982 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.45 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
25983 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.45 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26194 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.48 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26195 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.48 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26196 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.48 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26197 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.48 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26198 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.48 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26406 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.57 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26407 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.57 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26408 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.57 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26409 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.57 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26410 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.57 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26628 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.9 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26629 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.9 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26630 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.9 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26631 |
H28-MOJ-Online-Funa-7-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.9 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26848 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.10 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26849 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.10 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26850 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.10 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
26851 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.10 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27068 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.11 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27069 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.11 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27070 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.11 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27071 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.11 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27280 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.46 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27281 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.46 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27282 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.46 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27283 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.46 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27284 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.46 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27495 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.47 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27496 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.47 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27497 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.47 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27498 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.47 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27499 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.47 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27707 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.58 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27708 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.58 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27709 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.58 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27710 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.58 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27711 |
H28-MOJ-Online-Funa-7-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.4.58 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27858 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.100 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27859 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.100 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
27860 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.100 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28003 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.132 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28004 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.132 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28005 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.132 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28149 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.25 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28150 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.25 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28151 |
H28-MOJ-Online-Funa-8-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.25 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28306 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.128 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28307 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.128 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28308 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.128 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28453 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.130 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28454 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.130 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28455 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.130 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28600 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.26 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28601 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.26 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28602 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.26 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28744 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.27 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28745 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.27 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
28746 |
H28-MOJ-Online-Funa-8-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.5.27 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29030 |
H28-MOJ-Online-Funa-9-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.6.53 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29031 |
H28-MOJ-Online-Funa-9-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.6.53 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29032 |
H28-MOJ-Online-Funa-9-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.6.53 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29187 |
H28-MOJ-Online-Funa-9-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.6.55 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29188 |
H28-MOJ-Online-Funa-9-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.6.55 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29189 |
H28-MOJ-Online-Funa-9-Seg-1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.6.55 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29379 |
H28-MOJ-Online-Funa-9-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.6.54 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29380 |
H28-MOJ-Online-Funa-9-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.6.54 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29381 |
H28-MOJ-Online-Funa-9-Seg-2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.6.54 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29556 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.100 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29670 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.129 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
29785 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.25 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
30064 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.45 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
30188 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.53 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
30337 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.57 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
30494 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.61 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
30657 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.63 |
tcp |
9855 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
30658 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.63 |
tcp |
8443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
30833 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.65 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
31005 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.68 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
31215 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.69 |
tcp |
8093 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
31216 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.69 |
tcp |
3994 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
31217 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.69 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
31218 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.69 |
tcp |
1433 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
31368 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.70 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
31941 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.131 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
32085 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.150 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
32086 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.150 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
32087 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.150 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
32201 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.26 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
32478 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.46 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
32602 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.54 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
32750 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.58 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
32883 |
H28-MOJ-Online-Funa-12-seg-v2-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.62 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
33301 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.133 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
33413 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.27 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
33562 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.47 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
33710 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.48 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
33834 |
H28-MOJ-Online-Funa-12-seg-v3-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.55 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
33960 |
H28-MOJ-Online-Funa-12-seg-v4-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.87 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34103 |
H28-MOJ-Online-Funa-12-seg-v6-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.200 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34199 |
H28-MOJ-Online-Funa-12-seg-v7-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.201 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34226 |
H28-MOJ-Online-Funa-12-seg-v7-161103.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.9.203 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34465 |
H28-MOJ-Online-Funa-13-04-161103_ccslag.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.10.38 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34466 |
H28-MOJ-Online-Funa-13-04-161103_ccslag.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.10.38 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34646 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.11.151 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34647 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.11.151 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34648 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.11.151 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34649 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.11.151 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34956 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.11.33 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34957 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.11.33 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34958 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.11.33 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
34959 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.11.33 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35094 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.11.5 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35095 |
H28-MOJ-Online-Funa-14-01-161103_7dnetg.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.11.5 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35407 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.1 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35461 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.11 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35516 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.13 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35586 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.25 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35659 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.27 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35714 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.33 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35769 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.37 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35823 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.41 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35878 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.45 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35932 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.47 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
35987 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.5 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36042 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.53 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36150 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.61 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36205 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.65 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36260 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.67 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36315 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.69 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36368 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.71 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36423 |
H28-MOJ-Online-Funa-15-01-161103_dkj17f.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.9 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36478 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.10 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36533 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.12 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36588 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.2 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36658 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.26 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36713 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.34 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36767 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.38 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36822 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.42 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36876 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.46 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36931 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.48 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
36985 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.54 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37039 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.6 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37094 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.62 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37149 |
H28-MOJ-Online-Funa-15-02-161103_4tmj7k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.27.12.66 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37421 |
H28-MOJ-Online-Funa-19-01-161103_6tcyr3.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.25 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37422 |
H28-MOJ-Online-Funa-19-01-161103_6tcyr3.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.25 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37423 |
H28-MOJ-Online-Funa-19-01-161103_6tcyr3.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.25 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37568 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.26 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37569 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.26 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37570 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.26 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37715 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.27 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37716 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.27 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37717 |
H28-MOJ-Online-Funa-19-02-161103_ry3fcb.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.27 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37820 |
H28-MOJ-Teikyo-Yokohama-2-Seg-1-161121-ohwada-x250.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.129.14 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37821 |
H28-MOJ-Teikyo-Yokohama-2-Seg-1-161121-ohwada-x250.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.129.14 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37887 |
H28-MOJ-Teikyo-Yokohama-2-Seg-1-161121-ohwada-x250.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.129.217 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
37983 |
H28-MOJ-Teikyo-Yokohama-2-Seg-2-161121-ohwada-x250.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.129.212 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
38013 |
H28-MOJ-Teikyo-Yokohama-2-Seg-2-161121-ohwada-x250.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.129.216 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
38191 |
H28-MOJ-Teikyo-Yokohama-3-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.130.217 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
38623 |
H28-MOJ-Teikyo-Yokohama-3-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.130.212 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
38658 |
H28-MOJ-Teikyo-Yokohama-3-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.130.216 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
38873 |
H28-MOJ-Teikyo-Yokohama-12-Seg-1-161121-Endo_j4m2q3.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.131.213 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
38908 |
H28-MOJ-Teikyo-Yokohama-12-Seg-1-161121-Endo_j4m2q3.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.131.218 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
38942 |
H28-MOJ-Teikyo-Yokohama-12-Seg-2-161121-Endo_5spjeh.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.131.219 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39146 |
H28-MOJ-Teikyo-Yokohama-13-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.15 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39147 |
H28-MOJ-Teikyo-Yokohama-13-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.15 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39148 |
H28-MOJ-Teikyo-Yokohama-13-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.15 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39149 |
H28-MOJ-Teikyo-Yokohama-13-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.15 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39186 |
H28-MOJ-Teikyo-Yokohama-13-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.213 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39220 |
H28-MOJ-Teikyo-Yokohama-13-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.219 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39416 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.16 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39417 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.16 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39418 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.16 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39419 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.16 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39618 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.17 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39619 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.17 |
tcp |
23612 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39620 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.17 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39621 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.17 |
tcp |
23611 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39659 |
H28-MOJ-Teikyo-Yokohama-13-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.132.218 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39774 |
H28-MOJ-Teikyo-Yokohama-14-seg-01-21161121-abe_lsgo29.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.133.32 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39775 |
H28-MOJ-Teikyo-Yokohama-14-seg-01-21161121-abe_lsgo29.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.133.32 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39883 |
H28-MOJ-Teikyo-Yokohama-14-seg-01-21161121-abe_lsgo29.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.133.34 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39884 |
H28-MOJ-Teikyo-Yokohama-14-seg-01-21161121-abe_lsgo29.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.133.34 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39992 |
H28-MOJ-Teikyo-Yokohama-14-seg-02-21161121-abe_4l9d3v.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.133.33 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
39993 |
H28-MOJ-Teikyo-Yokohama-14-seg-02-21161121-abe_4l9d3v.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.133.33 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40102 |
H28-MOJ-Teikyo-Yokohama-14-seg-02-21161121-abe_4l9d3v.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.133.35 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40103 |
H28-MOJ-Teikyo-Yokohama-14-seg-02-21161121-abe_4l9d3v.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.133.35 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40232 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.100 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40233 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.100 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40234 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.100 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40366 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.129 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40367 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.129 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40368 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.129 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40497 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.26 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40498 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.26 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40499 |
H28-MOJ-Teikyo-Yokohama-15-Seg-1-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.26 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40630 |
H28-MOJ-Teikyo-Yokohama-15-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.128 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40631 |
H28-MOJ-Teikyo-Yokohama-15-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.128 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40632 |
H28-MOJ-Teikyo-Yokohama-15-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.128 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40761 |
H28-MOJ-Teikyo-Yokohama-15-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.25 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40762 |
H28-MOJ-Teikyo-Yokohama-15-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.25 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
40763 |
H28-MOJ-Teikyo-Yokohama-15-Seg-2-161121-ohwada-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.134.25 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
41061 |
H28-MOJ-Teikyo-Yokohama-16-seg-01-21161121-abe_4l6tzo.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.135.62 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
41757 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.150 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
41871 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.166 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
41872 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.166 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42128 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.201 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42156 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.203 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42185 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.204 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42215 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.208 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42295 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.218 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42473 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.25 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42595 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.30 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42596 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.30 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42952 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.62 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42953 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.62 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
42954 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.62 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43114 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.63 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43375 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.65 |
tcp |
9855 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43376 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.65 |
tcp |
7099 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43377 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.65 |
tcp |
3170 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43378 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.65 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43379 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.65 |
tcp |
49213 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43513 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.66 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43514 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.66 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43637 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.68 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43638 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.68 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43914 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.69 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
43915 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.69 |
tcp |
1433 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44052 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.70 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44256 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.71 |
tcp |
8093 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44257 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.71 |
tcp |
3994 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44258 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.71 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44259 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.71 |
tcp |
1433 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44295 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.87 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44572 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.129 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44573 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.129 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44574 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.129 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44675 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.130 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44879 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.205 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44909 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.209 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44943 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.213 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
44977 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.219 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
45123 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.26 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
45230 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.31 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
45231 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.31 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
45563 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.61 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
45722 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.64 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
45845 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.67 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
45846 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.138.67 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
45889 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.1 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
45932 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.10 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46112 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.15 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46156 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.20 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46199 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.25 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46250 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.32 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46293 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.33 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46336 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.63 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46379 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.65 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46422 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.66 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46465 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.68 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46508 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.69 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46571 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.11 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46614 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.16 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46657 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.2 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46700 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.26 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46743 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.67 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46786 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_340kd4.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.17 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46829 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_340kd4.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.3 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46872 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_c0h4ua.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.17 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46915 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_c0h4ua.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.3 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
46958 |
H28-MOJ-Teikyo-Yokohama-19-Seg-4-161121-Endo_qehd9k.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.4 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47001 |
H28-MOJ-Teikyo-Yokohama-19-Seg-5-161121-Endo_7i2nah.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.5 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47044 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.21 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47087 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.22 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47130 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.34 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47173 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.35 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47216 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.139.64 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47370 |
H28-MOJ-Teikyo-Yokohama-20-Seg-1-161121-Endo_694n4z.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.140.13 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47371 |
H28-MOJ-Teikyo-Yokohama-20-Seg-1-161121-Endo_694n4z.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.140.13 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47408 |
H28-MOJ-Teikyo-Yokohama-20-Seg-1-161121-Endo_694n4z.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.140.212 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47442 |
H28-MOJ-Teikyo-Yokohama-20-Seg-1-161121-Endo_694n4z.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.140.224 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47568 |
H28-MOJ-Teikyo-Yokohama-20-Seg-2-161121-Endo_nnt1f7.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.140.14 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47569 |
H28-MOJ-Teikyo-Yokohama-20-Seg-2-161121-Endo_nnt1f7.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.140.14 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47633 |
H28-MOJ-Teikyo-Yokohama-20-Seg-2-161121-Endo_nnt1f7.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.140.217 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47670 |
H28-MOJ-Teikyo-Yokohama-20-Seg-3-161121-Endo_awp0rr.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.140.216 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47704 |
H28-MOJ-Teikyo-Yokohama-20-Seg-3-161121-Endo_awp0rr.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.140.225 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47986 |
H28-MOJ-Teikyo-Yokohama-22-Seg-1-161121-Endo_ox5v27.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.1 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47987 |
H28-MOJ-Teikyo-Yokohama-22-Seg-1-161121-Endo_ox5v27.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.1 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
47988 |
H28-MOJ-Teikyo-Yokohama-22-Seg-1-161121-Endo_ox5v27.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.1 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48119 |
H28-MOJ-Teikyo-Yokohama-22-Seg-2-161121-Endo_j5lot6.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.2 |
tcp |
5000 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48120 |
H28-MOJ-Teikyo-Yokohama-22-Seg-2-161121-Endo_j5lot6.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.2 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48121 |
H28-MOJ-Teikyo-Yokohama-22-Seg-2-161121-Endo_j5lot6.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
192.168.1.2 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48318 |
H28-MOJ-Teikyo-Makuhari-3-Seg-1-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.161.62 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48484 |
H28-MOJ-Teikyo-Makuhari-4-Seg-1-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.162.201 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48512 |
H28-MOJ-Teikyo-Makuhari-4-Seg-1-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.162.202 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48541 |
H28-MOJ-Teikyo-Makuhari-4-Seg-1-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.162.204 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48569 |
H28-MOJ-Teikyo-Makuhari-4-Seg-1-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.162.206 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48774 |
H28-MOJ-Teikyo-Makuhari-4-Seg-1-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.162.62 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48775 |
H28-MOJ-Teikyo-Makuhari-4-Seg-1-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.162.62 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48776 |
H28-MOJ-Teikyo-Makuhari-4-Seg-1-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.162.62 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48886 |
H28-MOJ-Teikyo-Makuhari-4-Seg-4-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.162.162 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48916 |
H28-MOJ-Teikyo-Makuhari-4-Seg-4-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.162.205 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
48944 |
H28-MOJ-Teikyo-Makuhari-4-Seg-4-161124-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.162.207 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49191 |
H28-MOJ-Teikyo-Shinkawa-3-Seg-1-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.151.62 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49400 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-1-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.152.162 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49430 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-1-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.152.204 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49458 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-1-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.152.206 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49665 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-1-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.152.62 |
tcp |
9906 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49666 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-1-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.152.62 |
tcp |
9907 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49667 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-1-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.152.62 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49716 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-2-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.152.201 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49744 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-2-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.152.202 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49773 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-2-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.152.205 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49801 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-2-161122-w510.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
172.30.152.207 |
tcp |
82 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. |
https://sweet32.info/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49945 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.126 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49946 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.126 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49991 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.130 |
tcp |
8084 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
49992 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.130 |
tcp |
8083 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50026 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.131 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50124 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.15 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50221 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.160 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50222 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.160 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50296 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.17 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50395 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.18 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50396 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.18 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50397 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.18 |
tcp |
1433 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50489 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.21 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50490 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.21 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50579 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.22 |
tcp |
1311 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50580 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.22 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50629 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.226 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50682 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.39 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50734 |
H28_MUN_DWEB_Q4_172_16_20_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.20.63 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50847 |
H28_MUN_DWEB_Q4_172_16_21_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.21.226 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50938 |
H28_MUN_DWEB_Q4_172_16_211_0_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.211.54 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) SSLv2 EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export TLSv1 EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) SSLv2 IDEA-CBC-MD5 Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=MD5 RC2-CBC-MD5 Kx=RSA Au=RSA Enc=RC2-CBC(128) Mac=MD5 TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
51041 |
H28_MUN_DWEB_Q4_172_16_212_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.212.1 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
51089 |
H28_MUN_DWEB_Q4_172_16_212_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.212.220 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
51907 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.240.115 |
tcp |
1311 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
51908 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.240.115 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52077 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.240.131 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52252 |
H28_MUN_DWEB_Q4_172_16_242_seg.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
172.16.242.254 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52340 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.130 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52341 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.130 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52421 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.141 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52422 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.141 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52513 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.15 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52514 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.15 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52594 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.181 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52595 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.181 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52676 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.183 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52768 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.19 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52769 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.19 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52858 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.24 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52859 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.24 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52904 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.243 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52969 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.250 |
tcp |
14943 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53062 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.62 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53063 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.62 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53151 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.71 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53152 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.71 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53233 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.88 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53234 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.88 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53326 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.9 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53327 |
H28_MUN_DWEB_Q4_192_168_242_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.9 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53386 |
H28_MUN_DWEB_Q4_192_168_242_part5.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.65 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53387 |
H28_MUN_DWEB_Q4_192_168_242_part5.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.242.65 |
tcp |
1311 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53475 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.123 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53476 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.123 |
tcp |
1311 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53542 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.153 |
tcp |
1433 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53625 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.163 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53716 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.18 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53717 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.18 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53809 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.20 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53810 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.20 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53890 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.63 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53891 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.63 |
tcp |
3389 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53963 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.65 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54084 |
H28_MUN_DWEB_Q4_192_168_243_Part2_Retry2IPs.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.241 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54133 |
H28_MUN_DWEB_Q4_192_168_243_Part2_Retry2IPs.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.243.242 |
tcp |
9898 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-DSS-DES-CBC3-SHA Kx=DH Au=DSS Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54361 |
nessus-scan-192-168-10-10#20170210#1.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
192.168.10.10 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54492 |
1_Tokyu_remi_20170126.csv |
18453 |
94437 |
CVE-2016-2183 |
5 |
Medium |
54.199.215.149 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) SSLv2 IDEA-CBC-MD5 Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=MD5 RC2-CBC-MD5 Kx=RSA Au=RSA Enc=RC2-CBC(128) Mac=MD5 TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54533 |
2_tokyu_kosugi-square_20170118.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
202.53.27.201 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54567 |
tokyu_3_tokyu-style_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
157.7.183.113 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54604 |
tokyu_5_teiki_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
175.177.161.13 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54647 |
tokyu_6_tokyu_hospital_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
210.253.218.215 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54774 |
tokyu_7_tokyu_G_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
112.78.212.229 |
tcp |
995 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54775 |
tokyu_7_tokyu_G_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
112.78.212.229 |
tcp |
993 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54776 |
tokyu_7_tokyu_G_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
112.78.212.229 |
tcp |
25 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54777 |
tokyu_7_tokyu_G_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
112.78.212.229 |
tcp |
143 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54778 |
tokyu_7_tokyu_G_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
112.78.212.229 |
tcp |
21 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54779 |
tokyu_7_tokyu_G_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
112.78.212.229 |
tcp |
110 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54780 |
tokyu_7_tokyu_G_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
112.78.212.229 |
tcp |
587 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54992 |
tokyu_9_tokyu-pasmo_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
59.106.61.103 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54993 |
tokyu_9_tokyu-pasmo_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
59.106.61.103 |
tcp |
993 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54994 |
tokyu_9_tokyu-pasmo_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
59.106.61.103 |
tcp |
995 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54995 |
tokyu_9_tokyu-pasmo_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
59.106.61.103 |
tcp |
8443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54996 |
tokyu_9_tokyu-pasmo_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
59.106.61.103 |
tcp |
25 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54997 |
tokyu_9_tokyu-pasmo_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
59.106.61.103 |
tcp |
143 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54998 |
tokyu_9_tokyu-pasmo_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
59.106.61.103 |
tcp |
110 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
54999 |
tokyu_9_tokyu-pasmo_20170116.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
59.106.61.103 |
tcp |
587 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
55099 |
13_tokyu_bellselect_20170118.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
218.45.196.196 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
55227 |
23_tokyu_townmanage_20170118.csv |
18453 |
94437 |
CVE-2016-2183 |
2.6 |
Low |
202.53.23.217 |
tcp |
443 |
SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
The remote service supports the use of 64-bit block ciphers. |
The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a "birthday" attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. However, Nessus has not checked for such a mitigation. |
Reconfigure the affected application, if possible, to avoid use of all
64-bit block ciphers. Alternatively, place limitations on the number
of requests that are allowed to be processed over the same TLS
connection to mitigate this vulnerability. |
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ |
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) TLSv1 IDEA-CBC-SHA Kx=RSA Au=RSA Enc=IDEA-CBC(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|