Insecure encryption algorithm - SHA1
Description
The server where the application is stored supports insecure ciphers - SHA1.
Impact
Reverse a summary function to find sensitive information.
Recommendation
Use algorithms considered cryptographically secure.
Threat
Unauthorized attacker from internal network executing a MitM.
Expected Remediation Time
⏱️ 30 minutes.