GCM mode in TLS is vulnerable if nonces are not unique per message. The document describes scanning the internet and finding implementations that reuse nonces, allowing an attacker to recover the authentication key and manipulate messages. It proposes a man-in-the-middle attack where an attacker collects nonces from a server, waits for a repeat, recovers the key, and modifies encrypted content served to a victim. While TLS 1.2 specifies nonces, implementations sometimes fail to generate unique nonces correctly. Better guidance and testing tools are needed to prevent such vulnerabilities.