The remote service uses an SSL certificate that has been signed using a cryptographically weak hashing algorithm - MD5. This algorithm is known to be vulnerable to collision attacks. In theory, a determined attacker may be able to leverage this weakness to generate another certificate with the same digital signature, which could allow them to masquerade as the affected service.
Binary data 7201.pasl
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2761
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0009
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5623
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0995
tools.ietf.org/html/rfc3279
www.kb.cert.org/vuls/id/836068
www.microsoft.com/technet/security/advisory/961509.mspx