The server is using a common or default prime number as a parameter during the Diffie-Hellman key exchange.
This makes the secure session vulnerable to a precomputation attack. An attacker can spend a significant amount
of time to generate a lookup/rainbow table for a particular prime number. This lookup table can then be used to obtain
the shared secret for the handshake and decrypt the session.