In our web scans, we are seeing weak ciphers-enabled vulnerability.
example: Netsparker Enterprise detected that weak ciphers are enabled during
secure communication (SSL).
You should allow only strong ciphers on your webserver to protect
secure communication with your visitors.
List of Supported Weak Ciphers
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006B)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xC028)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xC027)
jdk.tls.disabledAlgorithms=MD5,SSLv3,DSA, DESede,DES,3DES, RSA keySize < 2048, CBC, TLSv1, TLSv1.1, RC4,DES-CBC3-SHA keySize <256, 3DES_EDE_CBC,RC4,,MD5withRSA, DH keySize < 1024, \
EC keySize < 224, anon, NULL, \
Windows -2012R2 server
Jdk1.8.0_281
Jenkins url: https:<hostname>:8443