Vulnerability Document
Vulnerability Document
1. Executive Summary
This report represents a security audit performed by Nexpose from Rapid7 LLC. It contains confidential information about the state of
your network. Access to this information by unauthorized personnel may allow them to compromise your network.
MACS SCAN March 03, 2025 15:49, March 03, 2025 15:54, 4 minutes Success
IST IST
There is not enough historical data to display overall asset trend.
The audit was performed on one system which was found to be active and was scanned.
There were 4 vulnerabilities found during this scan. No critical vulnerabilities were found. Critical vulnerabilities require immediate
attention. They are relatively easy for attackers to exploit and may provide them with full control of the affected systems. 3
vulnerabilities were severe. Severe vulnerabilities are often harder to exploit and may not provide the same access to affected systems.
There was one moderate vulnerability discovered. These often provide information to attackers that may assist them in mounting
subsequent attacks on your network. These should also be fixed in a timely manner, but are not as urgent as the other vulnerabilities.
There were 2 occurrences of the database-open-access and http-iis-default-install-page vulnerabilities, making them the most common
vulnerabilities. There were 3 vulnerability instances in the HTTP and Web categories, making them the most common vulnerability
categories.
Page 1
Audit Report
The http-iis-default-install-page vulnerability poses the highest risk to the organization with a risk score of 1,192. Risk scores are based
on the types and numbers of vulnerabilities on affected assets.
One operating system was identified during this scan.
There were 7 services found to be running during this scan.
The CIFS, DCE Endpoint Resolution, DCE RPC, HTTP, Microsoft SQL Monitor and TDS services were found on 1 systems, making
them the most common services. The HTTP service was found to have the most vulnerabilities during this scan with 3 vulnerabilities.
Page 2
Audit Report
2. Discovered Systems
Page 3
Audit Report
Description:
This system enables, but does not require SMB signing. SMB signing allows the recipient of SMB packets to confirm their authenticity
and helps prevent man in the middle attacks against SMB. SMB 2.x signing can be configured in one of two ways: not required (least
secure) and required (most secure).
Affected Nodes:
References:
Source Reference
URL https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-
signing
Vulnerability Solution:
•Microsoft Windows
Configure SMB signing for Windows
Configure the system to enable or require SMB signing as appropriate. The method and effect of doing this is system specific so
please see this Microsoft article for details. Note: ensure that SMB signing configuration is done for incoming connections (Server).
•Samba
Configure SMB signing for Samba
Configure Samba to enable or require SMB signing as appropriate. To enable SMB signing, put the following in the Samba
configuration file, typically smb.conf, in the global section:
server signing = auto
To require SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
server signing = mandatory
Page 4
Audit Report
Description:
The database allows any remote system the ability to connect to it. It is recommended to limit direct access to trusted systems because
databases may contain sensitive data, and new vulnerabilities and exploits are discovered routinely for them. For this reason, it is a
violation of PCI DSS section 1.3.6 to have databases listening on ports accessible from the Internet, even when protected with secure
authentication mechanisms.
Affected Nodes:
References:
Source Reference
URL https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf
Vulnerability Solution:
Configure the database server to only allow access to trusted systems. For example, the PCI DSS standard requires you to place the
database in an internal network zone, segregated from the DMZ
Description:
The IIS default installation or "Welcome" page is installed on this server. This usually indicates a newly installed server which has not
yet been configured properly and which may not be known about.
In many cases, IIS is installed by default and the user may not be aware that the web server is running. These servers are rarely
patched and rarely monitored, providing hackers with a convenient target that is not likely to trip any alarms.
Affected Nodes:
172.20.30.72:80 Running HTTP serviceProduct IIS exists -- Microsoft IIS 10.0HTTP GET request
to http://172.20.30.72/
HTTP response code was an expected 200
HTTP header 'Content-Location' not present
Page 5
Audit Report
172.20.30.72:80 Running HTTP serviceProduct IIS exists -- Microsoft IISHTTP GET request to
http://172.20.30.72/
HTTP response code was an expected 200
HTTP header 'Content-Location' not present
HTTP response code was an expected 200HTTP response code was an
expected 200HTTP response code was an expected 200HTTP response code
was an expected 200HTTP response code was an expected 200HTTP
response code was an expected 200HTTP response code was an expected
200HTTP response code was an expected 200
1: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://ww...
2: <html xmlns="http://www.w3.org/1999/xhtml">
3: <head>
4: <meta http-equiv="Content-Type" content="text/html; charset=iso-885...
5: <title>IIS Windows Server</title>
References:
Source Reference
URL https://techcommunity.microsoft.com/t5/iis-support-blog/http-options-and-default-page-vulnerabilities/ba-
p/1504845
Vulnerability Solution:
If this server is required to provide necessary functionality, then the default page should be replaced with relevant content. Otherwise,
this server should be removed from the network, following the security principle of minimum complexity.
If the server is not needed, it can be disabled in the following way: in the Services window of the Control Panel's Administrative Tools
section, right-click on the 'World Wide Web Server' entry and select 'Stop'. Set its startup type to 'Manual' so that it does not restart if
the machine is rebooted (this is done by selecting 'Properties' in the right-click menu).
Description:
Page 6
Audit Report
Web servers that respond to the OPTIONS HTTP method expose what other methods are supported by the web server, allowing
attackers to narrow and intensify their efforts.
Affected Nodes:
References:
Source Reference
URL https://www.owasp.org/index.php/Test_HTTP_Methods_(OTG-CONFIG-006)
Vulnerability Solution:
•Disable HTTP OPTIONS method
Disable HTTP OPTIONS method on your web server. Refer to your web server's instruction manual on how to do this.
Web servers that respond to the OPTIONS HTTP method expose what other methods are supported by the web server, allowing
attackers to narrow and intensify their efforts.
•Apache HTTPD
Disable HTTP OPTIONS Method for Apache
Disable the OPTIONS method by including the following in the Apache configuration:
<Limit OPTIONS>
Order deny,allow
Deny from all
</Limit>
•Microsoft IIS
Disable HTTP OPTIONS Method for IIS
Disable the OPTIONS method by doing the following in the IIS manager
1. Select relevent site
2. Select Request filtering and change to HTTP verb tab
3. Select Deny Verb from the actions pane
4. Type OPTIONS into the provided text box and press OK
•nginx nginx
Disable HTTP OPTIONS Method for nginx
Disable the OPTIONS method by adding the following line to your server block, you can add other HTTP methods to be allowed to run
after POST
Page 7
Audit Report
Page 8
Audit Report
4. Discovered Services
4.1. <unknown>
Page 9
Audit Report
4.2. CIFS
CIFS, the Common Internet File System, was defined by Microsoft to provide file sharing services over the Internet. CIFS extends the
Server Message Block (SMB) protocol designed by IBM and enhanced by Intel and Microsoft. CIFS provides mechanisms for sharing
resources (files, printers, etc.) and executing remote procedure calls over named pipes.
Page 10
Audit Report
4.5. HTTP
HTTP, the HyperText Transfer Protocol, is used to exchange multimedia content on the World Wide Web. The multimedia files
commonly used with HTTP include text, sound, images and video.
Page 11
Audit Report
•verbs-3: OPTIONS
•verbs-4: POST
•verbs-5: TRACE
•verbs-count: 5
172.20.30.72 tcp 5985 0 •Microsoft-HTTPAPI 2.0
•http.banner: Microsoft-HTTPAPI/2.0
•http.banner.server: Microsoft-
HTTPAPI/2.0
4.7. TDS
TDS, the Tabular Data Stream protocol, is used to send Structured Query Language (SQL) requests to TDS compliant database
servers. The most common TDS servers include Sybase and Microsoft SQL Servers, as well as various TDS compliant gateways.
Page 12
Audit Report
Page 13
Audit Report
6. Discovered Databases
No database information was discovered during the scan.
Page 14
Audit Report
Page 15
Audit Report
8. Policy Evaluations
No policy evaluations were performed.
Page 16
Audit Report
Page 17