TLS 1.0 enabled

Description

During the scan, Kayran managed to find that the web server supports encryption through TLS 1.0.
When aiming for PCI or DSS, it is recommended to use a newer version : TLS 1.3.

An attacker might be able to exploit this vulnerability to conduct MITM (Man-In-The-Middle) attacks and decrypt the traffic that takes place between the affected services and the customers.

Severity/Score

CVSS Version 3.x – 6.5 Medium

Recommendation

In order to prevent this vulnerability, make sure that you disable TLS 1.0 and replace it with the newer version of TLS 1.3.
Always do your best to make sure it’s updated to the latest release.

References

https://docs.microsoft.com/en-us/security/engineering/solving-tls1-problem

https://cwe.mitre.org/data/definitions/326.html

< Return to all Vulnerabilities

HTTP VS. HTTPS

You must have once wondered what HTTP means and what is the difference between that ugly word to HTTPS, and if not, then please read

Read More »

Bug Bounties

As pirates, we all love plundering, we all love raiding, but mostly, we all love bounties, especially Bug Bounties. Let’s talk about it. Bug Bounties

Read More »