Va-Pre & Post Vulnerability Scan - JK

Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

Scan Results

July 05, 2024

Report Summary
User Name: IT Support
Login Name: sugen3ts
Company: Solugenix Corporation
User Role: Manager
Address: 1365 N Scottsdale RD Suite 100
City: Scottsdale
State: Arizona
Zip: 85257
Country: United States of America
Created: 07/05/2024 at 04:03:48 AM (GMT-0600)
Launch Date: 07/02/2024 at 05:08:36 AM (GMT-0600)
Active Hosts: 11
Total Hosts: 11
Type: On demand
Status: Finished
Reference: scan/1719918516.26282
Scanner Appliances: SGX_HYD (Scanner 12.18.23-1, Vulnerability Signatures 2.6.85-4)
Duration: 00:09:48
Title: VA-Pre Vulnerability Scan for July-24(JK)
Asset Groups: SGX-Jakarta
IPs: 192.168.70.20-192.168.70.22, 192.168.70.24-192.168.70.26, 192.168.70.30,
192.168.90.1-192.168.90.2, 192.168.90.8-192.168.90.9
Excluded IPs: -
FQDNs: -
Options Profile: Initial Options

Summary of Vulnerabilities

Vulnerabilities Total 44 Security Risk (Avg) 0.0

by Severity
Severity Confirmed Potential Information Gathered Total
5 0 0 0 0
4 0 0 0 0
3 0 0 0 0
2 0 0 0 0
1 0 0 44 44
Total 0 0 44 44

5 Biggest Categories
Category Confirmed Potential Information Gathered Total
Information gathering 0 0 22 22
TCP/IP 0 0 11 11
Firewall 0 0 11 11
Total 0 0 44 44

Scan Results page 1


Vulnerabilities by Severity

Operating Systems Detected

Detailed Results

192.168.70.20 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

Scan Results page 2


SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.70.20 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,

Scan Results page 3


1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 522 seconds

Start time: Tue, Jul 02 2024, 11:57:27 GMT

End time: Tue, Jul 02 2024, 12:06:09 GMT

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No

Scan Results page 4


PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

192.168.70.21 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 5


RESULTS:
IP address Host name
192.168.70.21 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -

Scan Results page 6


Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 492 seconds

Start time: Tue, Jul 02 2024, 11:57:27 GMT

End time: Tue, Jul 02 2024, 12:05:39 GMT

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

Scan Results page 7


There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

192.168.70.22 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.70.22 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019

Scan Results page 8


User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the

Scan Results page 9


service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 523 seconds

Start time: Tue, Jul 02 2024, 11:57:27 GMT

End time: Tue, Jul 02 2024, 12:06:10 GMT

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

Scan Results page 10


192.168.70.24 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.70.24 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

Scan Results page 11


N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Scan Results page 12


Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 492 seconds

Start time: Tue, Jul 02 2024, 11:57:27 GMT

End time: Tue, Jul 02 2024, 12:05:39 GMT

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

192.168.70.25 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No

Scan Results page 13


PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.70.25 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

Scan Results page 14


There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 492 seconds

Start time: Tue, Jul 02 2024, 11:57:27 GMT

End time: Tue, Jul 02 2024, 12:05:39 GMT

Scan Results page 15


1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

192.168.70.26 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Scan Results page 16


Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.70.26 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

Scan Results page 17


1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 492 seconds

Start time: Tue, Jul 02 2024, 11:57:27 GMT

End time: Tue, Jul 02 2024, 12:05:39 GMT

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan Results page 18


Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

192.168.70.30 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.70.30 No registered hostname

1 Firewall Detected

Scan Results page 19


QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan Results page 20


The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 471 seconds

Start time: Tue, Jul 02 2024, 11:57:01 GMT

End time: Tue, Jul 02 2024, 12:04:52 GMT

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

Scan Results page 21


192.168.90.1 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.90.1 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

Scan Results page 22


N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Scan Results page 23


Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 523 seconds

Start time: Tue, Jul 02 2024, 11:57:27 GMT

End time: Tue, Jul 02 2024, 12:06:10 GMT

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

192.168.90.2 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No

Scan Results page 24


PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.90.2 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

Scan Results page 25


There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 492 seconds

Start time: Tue, Jul 02 2024, 11:57:27 GMT

End time: Tue, Jul 02 2024, 12:05:39 GMT

Scan Results page 26


1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

192.168.90.8 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Scan Results page 27


Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.90.8 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

Scan Results page 28


1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 522 seconds

Start time: Tue, Jul 02 2024, 11:57:27 GMT

End time: Tue, Jul 02 2024, 12:06:09 GMT

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan Results page 29


Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

192.168.90.9 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.90.9 No registered hostname

1 Firewall Detected

Scan Results page 30


QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan Results page 31


The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 492 seconds

Start time: Tue, Jul 02 2024, 11:57:27 GMT

End time: Tue, Jul 02 2024, 12:05:39 GMT

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

Scan Results page 32


Appendix

Hosts Scanned (IP)


192.168.70.20-192.168.70.22, 192.168.70.24-192.168.70.26, 192.168.70.30, 192.168.90.1-192.168.90.2, 192.168.90.8-192.168.90.9

Target distribution across scanner appliances


SGX_HYD : 192.168.70.20-192.168.70.22, 192.168.70.24-192.168.70.26, 192.168.70.30, 192.168.90.1-192.168.90.2, 192.168.90.8-192.168.90.9

Options Profile

Initial Options

Scan Settings
Ports:
Scanned TCP Ports: Standard Scan
Scanned UDP Ports: Standard Scan
Scan Dead Hosts: Off
Close Vulnerabilities on Dead Hosts Count: Off
Purge old host data when OS changes: Off
Load Balancer Detection: Off
Perform 3-way Handshake: Off
Vulnerability Detection: Complete
Intrusive Checks: Excluded
Excluded Search Lists: Network - Exceptions
Excluded QIDs: 11827 HTTP Security Header Not Detected
13607 Host is Vulnerable to Extended Master Secret TLS Extension (TLS
triple handshake)
38169 SSL Certificate - Self-Signed Certificate
38170 SSL Certificate - Subject Common Name Does Not Match Server FQDN
38171 SSL Certificate - Server Public Key Too Small
38172 SSL Certificate - Improper Usage Vulnerability
38173 SSL Certificate - Signature Verification Failed Vulnerability
38229 Service Stopped Responding
38304 SSH Protocol Version 1 Supported
38433 SIP UDP Transport Supported
38523 SSH Weak Cipher Used
38598 Deprecated Public Key Length
38601 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Use of
Weak Cipher Rivest Cipher 4 (RC4/ARC4/ARCFOUR)
38628 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Server
supports Transport Layer Security (TLSv1.0)
38655 X.509 Certificate SHA1 Signature Collision Vulnerability
38657 Birthday attacks against TLS ciphers with 64bit block size
vulnerability (Sweet32)
38666 SNMP GETBULK Reflected Distributed Denial Of Service (DoS)
Vulnerability
38670 Dropbear SSH Multiple Security Vulnerabilities
38685 SSL Certificate - Invalid Maximum Validity Date Detected
38738 SSH Server Public Key Too Small
38739 Deprecated SSH Cryptographic Settings
38794 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Server
Supports Transport Layer Security (TLSv1.1)
38863 Weak SSL/TLS Key Exchange
38909 SHA1 deprecated setting for SSH
42366 SSLv3.0/TLSv1.0 Protocol Weak CBC Mode Server Side Vulnerability
(BEAST)
42395 Encrypted Management Interfaces Accessible On Cisco Device
45242 Remote Management Service Accepting Unencrypted Credentials
Detected(HTTP)
48168 Remote Management Service Accepting Unencrypted Credentials
Detected (Telnet)
78031 Writeable SNMP Information
82024 UDP Constant IP Identification Field Fingerprinting Vulnerability
82054 TCP Sequence Number Approximation Based Denial of Service
105459 EOL/Obsolete Software: SNMP Protocol Version 1/2c Detected
316187 Cisco Adaptive Security Appliance Remote Code Execution and
Denial of Service Vulnerability (cisco-sa-20180129-asa1)

Scan Results page 33


Password Brute Forcing:
System: Disabled
Custom: Disabled
Authentication:
Windows: Disabled
Unix/Cisco/Network SSH: Disabled
Unix Least Privilege Authentication: Disabled
Oracle: Disabled
Oracle Listener: Disabled
SNMP: Disabled
VMware: Disabled
DB2: Disabled
HTTP: Disabled
MySQL: Disabled
Tomcat Server: Disabled
MongoDB: Disabled
Palo Alto Networks Firewall: Disabled
Jboss Server: Disabled
Oracle WebLogic Server: Disabled
MariaDB: Disabled
InformixDB: Disabled
MS Exchange Server: Disabled
Oracle HTTP Server: Disabled
MS SharePoint: Disabled
Sybase: Disabled
Kubernetes: Disabled
SAP IQ: Disabled
SAP HANA: Disabled
Azure MS SQL: Disabled
Neo4j: Disabled
NGINX: Disabled
Infoblox: Disabled
BIND: Disabled
Cisco_APIC: Disabled
Cassandra: Disabled
Overall Performance: Normal
Additional Certificate Detection:
Authenticated Scan Certificate Discovery: Disabled
Test Authentication: Disabled
Hosts to Scan in Parallel:
Use Appliance Parallel ML Scaling: Off
External Scanners: 15
Scanner Appliances: 30
Processes to Run in Parallel:
Total Processes: 10
HTTP Processes: 10
Packet (Burst) Delay: Medium
Port Scanning and Host Discovery:
Intensity: Normal
Dissolvable Agent:
Dissolvable Agent (for this profile): Disabled
Windows Share Enumeration: Disabled
Windows Directory Search: Disabled

Scan Results page 34


Lite OS Discovery: Disabled
Host Alive Testing: Disabled
Do Not Overwrite OS: Disabled
Perform Partial SSL/TLS Auditing: Enabled

Advanced Settings
Host Discovery: TCP Standard Scan, UDP Standard Scan, ICMP On
Ignore firewall-generated TCP RST packets: Off
Ignore all TCP RST packets: Off
Ignore firewall-generated TCP SYN-ACK packets: Off
Do not send TCP ACK or SYN-ACK packets during host discovery: Off

Report Legend

Vulnerability Levels

A Vulnerability is a design flaw or mis-configuration which makes your network (or a host on your network) susceptible to malicious attacks from local or
remote users. Vulnerabilities can exist in several areas of your network, such as in your firewalls, FTP servers, Web servers, operating systems or CGI bins.
Depending on the level of the security risk, the successful exploitation of a vulnerability can vary from the disclosure of information about the host to a
complete compromise of the host.

Severity Level Description

1 Minimal Intruders can collect information about the host (open ports, services, etc.) and may be
able to use this information to find other vulnerabilities.

2 Medium Intruders may be able to collect sensitive information from the host, such as the
precise version of software installed. With this information, intruders can easily
exploit known vulnerabilities specific to software versions.

3 Serious Intruders may be able to gain access to specific information stored on the host,
including security settings. This could result in potential misuse of the host by
intruders. For example, vulnerabilities at this level may include partial disclosure of
file contents, access to certain files on the host, directory browsing, disclosure of
filtering rules and security mechanisms, denial of service attacks, and unauthorized use
of services, such as mail-relaying.

4 Critical Intruders can possibly gain control of the host, or there may be potential leakage of
highly sensitive information. For example, vulnerabilities at this level may include
full read access to files, potential backdoors, or a listing of all the users on the
host.

5 Urgent Intruders can easily gain control of the host, which can lead to the compromise of your
entire network security. For example, vulnerabilities at this level may include full
read and write access to files, remote execution of commands, and the presence of
backdoors.

Potential Vulnerability Levels

A potential vulnerability is one which we cannot confirm exists. The only way to verify the existence of such vulnerabilities on your network would be to perform
an intrusive scan, which could result in a denial of service. This is strictly against our policy. Instead, we urge you to investigate these potential
vulnerabilities further.

Severity Level Description

1 Minimal If this vulnerability exists on your system, intruders can collect information about the
host (open ports, services, etc.) and may be able to use this information to find other
vulnerabilities.

2 Medium If this vulnerability exists on your system, intruders may be able to collect sensitive
information from the host, such as the precise version of software installed. With this
information, intruders can easily exploit known vulnerabilities specific to software
versions.

3 Serious If this vulnerability exists on your system, intruders may be able to gain access to
specific information stored on the host, including security settings. This could result
in potential misuse of the host by intruders. For example, vulnerabilities at this level
may include partial disclosure of file contents, access to certain files on the host,
directory browsing, disclosure of filtering rules and security mechanisms, denial of
service attacks, and unauthorized use of services, such as mail-relaying.

4 Critical If this vulnerability exists on your system, intruders can possibly gain control of the
host, or there may be potential leakage of highly sensitive information. For example,

Scan Results page 35


Severity Level Description

vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host.

5 Urgent If this vulnerability exists on your system, intruders can easily gain control of the
host, which can lead to the compromise of your entire network security. For example,
vulnerabilities at this level may include full read and write access to files, remote
execution of commands, and the presence of backdoors.

Information Gathered

Information Gathered includes visible information about the network related to the host, such as traceroute information, Internet Service Provider (ISP), or a
list of reachable hosts. Information Gathered severity levels also include Network Mapping data, such as detected firewalls, SMTP banners, or a list of open
TCP services.

Severity Level Description

1 Minimal Intruders may be able to retrieve sensitive information related to the host, such as
open UDP and TCP services lists, and detection of firewalls.

2 Medium Intruders may be able to determine the operating system running on the host, and view banner versions.

3 Serious Intruders may be able to detect highly sensitive data, such as global system user lists.

CONFIDENTIAL AND PROPRIETARY INFORMATION.


Qualys provides the QualysGuard Service "As Is," without any warranty of any kind. Qualys makes no warranty that the information contained in this
report is complete or error-free. Copyright 2024, Qualys, Inc.

Scan Results page 36

You might also like