TLS 1.1 enabled

Description

During the scan, Cytrix managed to find that the web server supports encryption through TLS 1.1.
When aiming for PCI or DSS, it is recommended to use a newer version : TLS 1.3.

An attacker might be able to exploit this vulnerability to conduct MITM (Man-In-The-Middle) attacks and decrypt the traffic that takes place between the affected services and the customers.

Severity/Score

CVSS Version 3.x – 8.2 High

Recommendation

In order to prevent this vulnerability, make sure that you disable TLS 1.1 and replace it with the newer version of TLS 1.3.
Always do your best to make sure it’s updated to the latest release.

References

https://blogs.windows.com/msedgedev/2020/03/31/tls-1-0-tls-1-1-schedule-update-edge-ie11/

https://cwe.mitre.org/data/definitions/326.html

< Return to all Vulnerabilities

Active Directory Hacking

What does Active Directory mean? The Active Directory infrastructure is a critical infrastructure in most organizations, and it forms the backbone of the organization’s computing

Read More »

Using VPN

What is a VPN? Why should someone be using VPN? Which Problems does is solve? and what is the advantages and disadvantages of it? Let’s

Read More »