Check for the Ephemeral Invalid Curve vulnerability.
If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.
|Not vulnerable to Ephemeral Invalid Curve attacks.
|Vulnerable by Ephemeral Invalid Curve attacks.
|The server is vulnerable to an Ephemeral Invalid Curve Angriff. This allows an attacker to attack connections.
|Elliptic Curve Cryptography (ECC) is one of the cornerstones of modern cryptography due to its security and performance features. It is used in key exchange protocols and to calculate signatures. However, fatal security holes can occur if it is used incorrectly.
|The server is vulnerable through an implementation vulnerability that allows an attacker to decrypt the communication.
|If vulnerability was reported, update your TLS implementation on your server immediately.