- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
CheckMates Fest 2026
Watch Now!AI Security Masters
Hacking with AI: The Dark Side of Innovation
CheckMates Go:
CheckMates Fest
hi @G_W_Albrecht ,
i have succesfully completed the vulnerability mitigations based on the sk147272 and cipher_util tool
thanks for the response guys
You already found the solution, sk126613. Run cipher_util and remove the weak ciphers. The SK has full instructions on how to do that.
hell
Wait a moment, you are running R80.30? It is out of support for a while now.
Concerning your question, you really need to explain what you are trying to achieve. Removing ciphers from SSL Inspection will lead to a situation when traffic will not be inspected if a website only offers weak ciphers to use.
What are you trying to achieve in the first place? Harden the system? Which part of the functionalities?
apologies to val , here i have attached the weak ciphers i really don;t know where i need to disable this and this is my first time using the cipher_utill
actually that was my lab environment R80.30 ,the original vulnerability observed by R81
Which vulnerability? You are not making much sense. Please elaborate, what do you want to achieve here?
What is the tool reporting week filters?
hello
Multi Portal as this is always enabled ! See about the process and how to restart which services here: sk178165: The configuration made with the 'cipher_util' on a Security Gateway is not applied immedia...
the tools QUALYS SSl labs
I assume it is testing the SSL capabilities of your GW. Choose the Multi-portal, remove weak filters and check if the issue is resolved.
Do you have SSL Inspection enabled at all ?
According to the output above you do not have SSL Inspection for TP enabled. Open the GW object and select HTTPS inspection in left column - Enable HTTPS inspection is unchecked.
Did you succeed to disable the weak ciphers yet ?
hi @G_W_Albrecht ,
i have succesfully completed the vulnerability mitigations based on the sk147272 and cipher_util tool
thanks for the response guys
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 57 | |
| 43 | |
| 15 | |
| 14 | |
| 14 | |
| 11 | |
| 11 | |
| 10 | |
| 9 | |
| 8 |
Thu 12 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 3: AI-Generated Malware - From Experimentation to Operational RealityFri 13 Feb 2026 @ 10:00 AM (CET)
CheckMates Live Netherlands - Sessie 43: Terugblik op de Check Point Sales Kick Off 2026Thu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesThu 12 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 3: AI-Generated Malware - From Experimentation to Operational RealityFri 13 Feb 2026 @ 10:00 AM (CET)
CheckMates Live Netherlands - Sessie 43: Terugblik op de Check Point Sales Kick Off 2026Thu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY