- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
We have scanned our SMS Server and found 2 vulnerablities. Can anyone suggest me how to fix them?
1. Weak Key Exchange (KEX) Algorithm(s) Supported (SSH)
The remote SSH server is configured to allow / support weak key exchange (KEX) algorithm(s).
Port 22/tcp
2. Weak Encryption Algorithm(s) Supported (SSH)
The remote SSH server is configured to allow / support weak encryption algorithm(s).
Port 22/tcp
See the resources posted in reply to this discussion amongst others:
See the resources posted in reply to this discussion amongst others:
Which KEX and MAC were identified as weak by the scanner?
@JozkoMrkvicka
For KEX
- Disable the reported weak KEX algorithm(s)
1024-bit MODP group / prime KEX algorithms:
Alternatively use elliptic-curve Diffie-Hellmann in general, e.g. Curve 25519.
2. For MAC
Disable the reported weak encryption algorithm(s).
I would say what @Chris_Atkinson gave is your solution. Btw, you can also run cipher_util from expert mode and see options available there.
Best,
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY