04-27-2017 02:03 AM - edited 03-17-2019 10:10 AM
Hi Team,
Our client ordered penetration test, and as a feedback they got recommendation on the Cisco UCS BE6K server "The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all".
Please review the below mentioned updates which we got from the penetration test team.
Is there any way by which we can change the algorithms used between SSH server and client ?.
Thanks & Regards
Nithin Louis.
Vulnerability Name | Vulnerability Impact | SOLUTION | Additional Information |
SSH Weak Algorithms Supported | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. | Contact the vendor or consult product documentation to remove the weak ciphers. | The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 |
Solved! Go to Solution.