Hi,
My router setup is currently using Shibby’s Tomato Firmware 1.28.0000 MIPSR2-140 K26AC USB AIO-64K on an ASUS RT-N66U router, we are using TrustWave as our vulnerability scanning vendor for PCI Compliance. Right now, I’m getting flagged for accepting weak ciphers.
How do I go about disabling the weak 112 bit DES-CBC3-SHA ciphers in tomato? According to shibby, Build 140 should have had openssl 1.0.2k loaded into the firmware. If I’m reading the results of these scans...
CVE-2016-2183 Mitigation Shibby Tomato version 1.28 Build 140 ASUS RT-N66u
My router setup is currently using Shibby’s Tomato Firmware 1.28.0000 MIPSR2-140 K26AC USB AIO-64K on an ASUS RT-N66U router, we are using TrustWave as our vulnerability scanning vendor for PCI Compliance. Right now, I’m getting flagged for accepting weak ciphers.
How do I go about disabling the weak 112 bit DES-CBC3-SHA ciphers in tomato? According to shibby, Build 140 should have had openssl 1.0.2k loaded into the firmware. If I’m reading the results of these scans...
CVE-2016-2183 Mitigation Shibby Tomato version 1.28 Build 140 ASUS RT-N66u