Security Engineering December 1, 2025

Vulnerability Scans and TLS

SSL and TLS version and cipher issues are common in scan output. Here is when they are a real risk versus report noise.

KM

Kyle Murray

Vanguard Cyber

Removing TLS noise from vulnerability scans

Scans love SSLv2, SWEET32, TLS 1.0/1.1, and weak ciphers. In practice you are usually fine, but fixing them keeps reports quiet and crypto modern.

It is common to see outdated SSL/TLS versions or cipher suites in penetration tests or vulnerability scans. CVSS can look scary, but in reality you are likely fine. These are generally a nuisance for both sides to fix and to report. It is more of a security hygiene exercise.

Typical line items include SSL Version 2 and 3, SWEET32, TLS 1.1 deprecated, TLS 1.0 detection, and RC4 (Bar Mitzvah). They thrive in reports and are relatively simple to fix. Let's have a look at common paths on Windows IIS and Linux Apache and Nginx.

Windows IIS

A scan for allowed protocols may show TLS 1.0 and 1.1 enabled.

SSL scan TLS 1.0 and 1.1

Disable legacy TLS via SCHANNEL registry keys (defaults otherwise apply). Open Registry Editor and navigate to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols

It starts empty, so create keys per protocol. Create a key TLS 1.0.

Registry TLS 1.0 key

Under TLS 1.0, add subkeys Client and Server.

Client and Server subkeys

Inside each, create DWORD values Enabled (leave at 0) and DisabledByDefault set to 1.

DWORD creation DisabledByDefault 1

Replicate for TLS 1.1. You should end up with a structure like:

Full registry structure

Registry changes apply at startup. Reboot the server and rerun the scan. TLS 1.0/1.1 should no longer be offered.

Scan after TLS fix

Now to look at the cipher suites, if we took the results from the initial scan, it shows that weak ciphers are used. In your vulnerability report, there may be cipher suites with less than 112 bits or using encryption such as 3DES or RC4.

Weak ciphers in scan

To remove weak ciphers (<112 bits, 3DES, RC4, etc.), use a GPO to set cipher order.

Open Group Policy Editor and navigate to Computer Configuration > Administrative Templates > Network > SSL Configuration Settings > SSL Cipher Suite Order.

Enable and set the suite list to something like:

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
GPO SSL Cipher Suite Order

After policy applies and the server reboots, rescan.

Scan after cipher fix

Linux Apache

Default Apache often shows TLS 1.0/1.1 in scans.

Apache scan TLS 1.0 1.1

Config may only block SSLv3 explicitly.

Only SSLv3 blocked

To remove unsafe protocols TLS v1.2 can be explicitly set.

TLS 1.2 set

Weak ciphers may still appear in scans (highlighted in yellow).

Apache weak ciphers scan

In /etc/apache2/mods-enabled/ssl.conf, Apache may allow all ciphers and use a denylist.

ssl.conf denylist

You can instead allowlist strong ciphers via SSLCipherSuite and default to block weak ciphers.

SSLCipherSuite allowlist

Restart Apache and verify.

The scan should now show TLS 1.2 enabled.

Apache TLS scan clean

And the cipher scan should now show no weak ciphers.

Apache cipher scan clean

Linux Nginx

To resolve the weak TLS and cipher suites used in the Nginx site, the configuration file can be updated to explicitly allow safe and modern protocols.

Update the site config to drop SSLv3, TLS 1.0, and TLS 1.1 from ssl_protocols.

Nginx default SSL Nginx protocols trimmed

To solve for the weak cipher suites, they will need to be listed in the file.

Set modern ciphers compatible with TLS 1.2, for example:

ssl_ciphers 'ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256';
Nginx ssl_ciphers

Reload Nginx and rescan.

Nginx scan clean

Talk to us about
your next assessment

Whether you are scoping a test, preparing for an audit, or building a roadmap, we keep the conversation clear, proportionate, and focused on what your teams and stakeholders need.