Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
7261 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
25566 |
83738 |
CVE-2015-4000 |
2.6 |
Low |
172.27.137.63 |
tcp |
9855 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
7262 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
25566 |
83875 |
CVE-2015-4000 |
2.6 |
Low |
172.27.137.63 |
tcp |
9855 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|
8009 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
25566 |
83875 |
CVE-2015-4000 |
2.6 |
Low |
172.27.137.70 |
tcp |
443 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) |
|
18926 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
25566 |
83875 |
CVE-2015-4000 |
2.6 |
Low |
172.30.201.61 |
tcp |
443 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_3DES_EDE_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_3DES_EDE_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_WITH_3DES_EDE_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) |
|
30648 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
25566 |
83738 |
CVE-2015-4000 |
2.6 |
Low |
172.27.9.63 |
tcp |
9855 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
30649 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
25566 |
83875 |
CVE-2015-4000 |
2.6 |
Low |
172.27.9.63 |
tcp |
9855 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|
31364 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
25566 |
83875 |
CVE-2015-4000 |
2.6 |
Low |
172.27.9.70 |
tcp |
443 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) |
|
45558 |
H28-MOJ-Teikyo-Yokohama-18-seg-02-21161121-abe_vilnov.csv |
25566 |
83875 |
CVE-2015-4000 |
2.6 |
Low |
172.30.138.61 |
tcp |
443 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_3DES_EDE_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_3DES_EDE_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_WITH_3DES_EDE_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) |
|
51166 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
25566 |
83738 |
CVE-2015-4000 |
2.6 |
Low |
172.16.240.115 |
tcp |
1311 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
51167 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
25566 |
83875 |
CVE-2015-4000 |
2.6 |
Low |
172.16.240.115 |
tcp |
1311 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|
52248 |
H28_MUN_DWEB_Q4_172_16_242_seg.csv |
25566 |
83738 |
CVE-2015-4000 |
2.6 |
Low |
172.16.242.254 |
tcp |
443 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
52249 |
H28_MUN_DWEB_Q4_172_16_242_seg.csv |
25566 |
83875 |
CVE-2015-4000 |
2.6 |
Low |
172.16.242.254 |
tcp |
443 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|
53470 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
25566 |
83738 |
CVE-2015-4000 |
2.6 |
Low |
192.168.243.123 |
tcp |
1311 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
53471 |
H28_MUN_DWEB_Q4_192_168_243_Part1.csv |
25566 |
83875 |
CVE-2015-4000 |
2.6 |
Low |
192.168.243.123 |
tcp |
1311 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|
56747 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
25566 |
83738 |
CVE-2015-4000 |
4.3 |
Medium |
172.16.240.115 |
tcp |
1311 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
56748 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
25566 |
83875 |
CVE-2015-4000 |
4.3 |
Medium |
172.16.240.115 |
tcp |
1311 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|
57759 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
25566 |
83738 |
CVE-2015-4000 |
4.3 |
Medium |
172.16.240.35 |
tcp |
443 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
57760 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
25566 |
83875 |
CVE-2015-4000 |
4.3 |
Medium |
172.16.240.35 |
tcp |
443 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|
58056 |
H28_DWeb_NWScan_Q1_172_16_242_Seg.csv |
25566 |
83738 |
CVE-2015-4000 |
4.3 |
Medium |
172.16.242.254 |
tcp |
443 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
58057 |
H28_DWeb_NWScan_Q1_172_16_242_Seg.csv |
25566 |
83875 |
CVE-2015-4000 |
4.3 |
Medium |
172.16.242.254 |
tcp |
443 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|
59403 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
25566 |
83738 |
CVE-2015-4000 |
4.3 |
Medium |
192.168.243.123 |
tcp |
1311 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
59404 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
25566 |
83875 |
CVE-2015-4000 |
4.3 |
Medium |
192.168.243.123 |
tcp |
1311 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|
59474 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
25566 |
83738 |
CVE-2015-4000 |
4.3 |
Medium |
192.168.243.124 |
tcp |
1311 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
59475 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
25566 |
83875 |
CVE-2015-4000 |
4.3 |
Medium |
192.168.243.124 |
tcp |
1311 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|
59896 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
25566 |
83738 |
CVE-2015-4000 |
4.3 |
Medium |
192.168.243.216 |
tcp |
1311 |
SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) |
The remote host supports a set of weak ciphers. |
The remote host supports EXPORT_DHE cipher suites with keys less than
or equal to 512 bits. Through cryptanalysis, a third party can find
the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_DHE cipher suites. Thus, it is recommended to remove
support for weak cipher suites. |
Reconfigure the service to remove support for EXPORT_DHE cipher
suites. |
https://weakdh.org/ |
EXPORT_DHE cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) TLSv1 EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES-CBC(40) Mac=SHA1 export The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} |
|
59897 |
H28_DWeb_NWScan_Q1_192_168_243_Seg.csv |
25566 |
83875 |
CVE-2015-4000 |
4.3 |
Medium |
192.168.243.216 |
tcp |
1311 |
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. |
The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections. |
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater. |
http://weakdh.org/ |
Vulnerable connection combinations : SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) SSL/TLS version : SSLv3 Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Diffie-Hellman MODP size (bits) : 512 Logjam attack difficulty : Easy (could be carried out by individuals) |
|