The application uses a weak TLS cipher. TLS protocols provide for a wider variety of cipher suites, some of which have been identified as being cryptographically weak and susceptible to cryptanalysis.
Cryptographically weak ciphers can be exploited by attackers to perform decryption, Man-in-the-Middle (MitM), and session downgrade attacks. If successful, these attacks could allow an attacker to view encrypted data in clear-text.
How To Test
Sample Report Screenshots
Time Saving Tips