Description

The remote host supports the use of SSL ciphers that offer either weak encryption or no encryption at all.

Remediation

Reconfigure the affected application to avoid use of weak ciphers.

References

Related Vulnerabilities