Skip to main content

What do you think of this service? Your feedback will help us to improve it.

Author: Government Digital Service

Weak or suboptimal cipher suites supported

What this means

Weak or suboptimal cipher suites are cryptographic algorithms that are less secure due to known vulnerabilities or weaknesses.

If a server supports such cipher suites, it may expose connections to potential attacks and interception.

Why this is a problem

Suboptimal ciphers may provide inadequate encryption, making it easier for attackers to decrypt data.

Weak cipher suites allows attackers to exploit them through downgrade attacks or cryptographic weaknesses, this can result in sensitive data being leaked or for attackers to redirect users to malicious sites.

Using suboptimal ciphers can result in non-compliance with security standards like PCI-DSS and HIPAA, and can also undermine confidence in webpages and in some cases may cause accessibility problems.

How to check if the problem is there

Check the webserver’s SSL/TLS configuration for suboptimal cipher suites (e.g., 3DES, RC4, MD5-based ciphers).

There are a number of online tools such as Qualys SSL Labs which can be used to check what cipher suites and protocols are enabled on a website.

How to fix this

Remove support for suboptimal cipher suites in the server’s SSL/TLS configuration.

Ensure that strong cipher suites are preferred where possible.

Disable outdated protocols such as TLS 1.0 and TLS 1.1 and ensure the server uses TLS 1.2 and TLS 1.3.

Keep updated SSL/TLS libraries and server software to support the latest and most secure cipher suites, and ensure that these are enabled.

Periodically test the server’s SSL/TLS configuration using automated tools to ensure compliance with security best practices.

Further information

A list of ciphers and protocols which provide strict security whilst maintaining good compatibility are published by Microsoft under the profile name of 20220101S.

Consider aligning your configuration to these recommendations which provide a good blend of security and compatibility.

Sign up to UK Government Security

Subscribe to our newsletters to receive notifications when changes to strategy, policy, standards, and guidance are published on the website.

Sign up now