Nessus scan found vulnerabilities in cypher suites supported.
May 18, 2016
February 17, 2017
Model |
Firmware Version |
SG500 Series |
1.4.5.02 |
Nessus scan shows a weak hash algorithm, an SSL vulnerability. The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service.
Issue should be fixed when you upgrade to the latest firmware version 1.4.7.06.