Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
7260 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
172.27.137.63 |
tcp |
9855 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
30647 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
172.27.9.63 |
tcp |
9855 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
50936 |
H28_MUN_DWEB_Q4_172_16_211_0_seg.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
172.16.211.54 |
tcp |
443 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
51165 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
172.16.240.115 |
tcp |
1311 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52247 |
H28_MUN_DWEB_Q4_172_16_242_seg.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
172.16.242.254 |
tcp |
443 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53469 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
192.168.243.123 |
tcp |
1311 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53540 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
192.168.243.153 |
tcp |
1433 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
56118 |
H28_DWEB_NW_Scan_Q1_172_16_211_Seg_20160518_xux6yw.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
172.16.211.54 |
tcp |
443 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
56746 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
172.16.240.115 |
tcp |
1311 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
57758 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
172.16.240.35 |
tcp |
443 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
58055 |
H28_DWeb_NWScan_Q1_172_16_242_Seg.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
172.16.242.254 |
tcp |
443 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
59402 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
192.168.243.123 |
tcp |
1311 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
59473 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
192.168.243.124 |
tcp |
1311 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
59538 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
192.168.243.153 |
tcp |
1433 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
59894 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
192.168.243.216 |
tcp |
1311 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
59895 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
22706 |
81606 |
CVE-2015-0204 |
5 |
Medium |
192.168.243.216 |
tcp |
1226 |
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_RSA cipher
suites. |
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4 |
EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2-CBC(40) Mac=MD5 export EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|