This is my first time running a vulnerability scan software like OpenVas. It is really a great tool to found out about vulnerabilities in the network. I have found difficult to troubleshoot the vulnerabilities related to weak cipher suites and protocols. For example, the OpenVas reports:
2.6.2 Medium 48004/tcp Medium (CVSS: 4.3) NVT: SSL/TLS: SSLv3 Protocol CBC Cipher Suites Information Disclosure Vulnerability (POODLE) Summary This host is prone to an information disclosure vulnerability. However, when I scan the same server with Qualys SSL Labs online test, I get:
Protocols TLS 1.3 No TLS 1.2 Yes TLS 1.1 Yes TLS 1.0 Yes SSL 3 No SSL 2 No For TLS 1.3 tests, we currently support draft version 18. I remember using IISCrypto in this machine to disable obsolete protocols and cipher suites.
Can a server have cipher suites enable/disable in some ports? Can my Windows Server have SSL3 enable in port 48004, but disable on port 443?
Thanks