TLS Certificate Signed Using Weak Hashing Algorithm - SHA-1

medium Nessus Network Monitor Plugin ID 7200

Synopsis

The SSL certificate has been signed using a weak hash algorithm - SHA-1.

Description

The remote service uses an SSL certificate that has been signed using a cryptographically weak hashing algorithm - SHA-1. This algorithm is known to be vulnerable to collision attacks. In theory, a determined attacker may be able to leverage this weakness to generate another certificate with the same digital signature, which could allow them to masquerade as the affected service.

Solution

Configure the service to only allow strong encryption, and replace the certificate if necessary.

See Also

https://konklone.com/post/why-google-is-hurrying-the-web-to-kill-sha-1

http://googleonlinesecurity.blogspot.com/2014/09/gradually-sunsetting-sha-1.html

https://blog.cloudflare.com/sha-1-deprecation-no-browser-left-behind

Plugin Details

Severity: Medium

ID: 7200

Version: 1.0

Family: Generic

Published: 5/21/2016

Updated: 8/16/2018