Your server supports weak or deprecated cipher suites that are vulnerable to known attacks, including DES, 3DES, RC4, and export-grade ciphers.
Disable weak cipher suites (DES, 3DES, RC4) and enforce TLS 1.2+ in your web server configuration.
Your web server accepts connections using cipher suites that have known vulnerabilities. These weak ciphers can potentially be broken by attackers, compromising encrypted connections.
Weak ciphers expose your users to man-in-the-middle attacks, session hijacking, and data interception. PCI DSS and SOC 2 compliance also flag weak ciphers as vulnerabilities.
See which ciphers your server currently supports.
nmap --script ssl-enum-ciphers -p 443 yourdomain.comConfigure Nginx to use only strong cipher suites.
ssl_ciphers HIGH:!aNULL:!MD5;ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305;
ssl_prefer_server_ciphers on;Configure Apache to use only strong cipher suites.
SSLCipherSuite HIGH:MEDIUM:!aNULL:!MD5SSLProtocol all -SSLv3 -TLSv1 -TLSv1.1
SSLCipherSuite ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305
SSLHonorCipherOrder onRestart your web server and test the cipher configuration.
sudo systemctl reload nginx
# Verify no weak ciphers:
nmap --script ssl-enum-ciphers -p 443 yourdomain.com | grep -E "(DES|RC4|3DES|EXPORT)"After making changes, use our free scanner to verify the fix is working correctly. DNS changes can take up to 48 hours to propagate, but most propagate within minutes.
Use ECDHE key exchange with AES-GCM or ChaCha20-Poly1305: ECDHE-ECDSA-AES128-GCM-SHA256, ECDHE-RSA-AES128-GCM-SHA256, ECDHE-ECDSA-AES256-GCM-SHA384, and their ChaCha20 equivalents.
DES, 3DES (DES-CBC3), RC4, export-grade ciphers, NULL encryption, MD5-based MACs, and any cipher without forward secrecy (lacking ECDHE or DHE).
Only for very old clients. IE on Windows XP, Android 4.3 and older, and Java 6 may not support modern ciphers. Virtually all current browsers work fine.