DES and Triple DES are 64-bit block ciphers that are commonly used in popular cryptographic protocols such as SSH, TLS, OpenVPN, and IPsec. This vulnerability, also known as the Sweet32 Birthday attack, takes advantage of the design weaknesses in these ciphers to allow an attacker to carry out a man-in-the-middle attack and harvest sensitive information.
All versions of SSL/TLS protocols that support DES and Three DES cipher suites are vulnerable to CVE-2016-2183.
If you must use DES or Triple DES, you should keep to a threshold of 32 GB. This should apply for all data sent or received using the same symmetric key. Disable or remove deprecated DES and Triple DES algorithms from your servers. If you have an old server that only supports legacy ciphers, you should upgrade to a better one. Using more secure encryption methods, such as AES, could also save you from this vulnerability.
Phase out weak ciphers, such as DES and Triple DES, from your IT environments. Keep all server software updated.