Vulnerability Scan Report _ Sample
Vulnerability Scan Report _ Sample
Summary
This document reports on the results of an automatic security scan. All dates are dis-
played using the timezone Coordinated Universal Time, which is abbreviated UTC. The
task was MS2. The scan started at Mon Mar 17 15:07:28 2025 UTC and ended at Mon Mar
17 15:45:13 2025 UTC. The report rst summarises the results found. Then, for each host,
the report describes every issue found. Please consider the advice given in each description,
in order to rectify the issue.
Contents
1 Result Overview 2
1.1 Host Authentications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1
CONTENTS 2
1 Result Overview
This report contains all 67 results selected by the ltering described above. Before ltering
there were 566 results.
. . . (continued) . . .
Service (Port) Threat Level
3306/tcp High
1524/tcp High
6200/tcp High
514/tcp High
3632/tcp High
21/tcp High
80/tcp High
5900/tcp Medium
2121/tcp Medium
22/tcp Medium
23/tcp Medium
5432/tcp Medium
21/tcp Medium
25/tcp Medium
445/tcp Medium
80/tcp Medium
general/tcp Low
22/tcp Low
5432/tcp Low
general/icmp Low
25/tcp Low
Summary
Try to log in with given passwords via VNC protocol.
Solution:
Solution type: Mitigation
Change the password to something hard to guess or enable password protection at all.
Vulnerability Insight
This script tries to authenticate to a VNC server with the passwords set in the password prefer-
ence. It will also test and report if no authentication / password is required at all.
. . . continues on next page . . .
2 RESULTS PER HOST 5
[ return to 10.0.0.11 ]
Summary
Systems using Distributed Ruby (dRuby/DRb), which is available in Ruby versions 1.6 and later,
may permit unauthorized systems to execute distributed commands.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 6
Solution:
Solution type: Mitigation
Administrators of environments that rely on Distributed Ruby should ensure that appropriate
controls are in place. Code-level controls may include:
- Implementing taint on untrusted input
- Setting $SAFE levels appropriately (>=2 is recommended if untrusted hosts are allowed to
submit Ruby commands, and >=3 may be appropriate)
- Including drb/acl.rb to set ACLEntry to restrict access to trusted hosts
References
url: https://tools.cisco.com/security/center/viewAlert.x?alertId=22750
url: http://www.securityfocus.com/bid/47071
url: http://blog.recurity-labs.com/archives/2011/05/12/druby_for_penetration_tes
,→ters/
url: http://www.ruby-doc.org/stdlib-1.9.3/libdoc/drb/rdoc/DRb.html
[ return to 10.0.0.11 ]
Summary
It was possible to login into the remote FTP server using weak/known credentials.
Impact
This issue may be exploited by a remote attacker to e.g. gain access to sensitive information or
modify system conguration.
Solution:
Solution type: Mitigation
Change the password as soon as possible.
Vulnerability Insight
The following devices are / software is known to be aected:
- CVE-2001-1594: Codonics printer FTP service as used in GE Healthcare eNTEGRA P&R
- CVE-2013-7404: GE Healthcare Discovery NM 750b
- CVE-2014-9198: Schneider Electric ETG3000 FactoryCast HMI gateways
- CVE-2015-7261: QNAP iArtist Lite distributed with QNAP Signage Station
- CVE-2016-8731: Foscam C1 devices
- CVE-2017-8218: vsftpd on TP-Link C2 and C20i devices
- CVE-2018-9068: IMM2 for IBM and Lenovo System x
- CVE-2018-17771: Ingenico Telium 2 PoS terminals
- CVE-2018-19063, CVE-2018-19064: Foscam C2 and Opticam i5 devices
Note: As the VT 'FTP Brute Force Logins' (OID: 1.3.6.1.4.1.25623.1.0.108717) might run into
a timeout the actual reporting of this vulnerability takes place in this VT instead.
References
cve: CVE-1999-0501
cve: CVE-1999-0502
cve: CVE-1999-0507
cve: CVE-1999-0508
cve: CVE-2001-1594
cve: CVE-2013-7404
cve: CVE-2014-9198
cve: CVE-2015-7261
cve: CVE-2016-8731
cve: CVE-2017-8218
cve: CVE-2018-9068
. . . continues on next page . . .
2 RESULTS PER HOST 8
[ return to 10.0.0.11 ]
Summary
This remote host is running a rexec service.
Solution:
Solution type: Mitigation
Disable the rexec service and use alternatives like SSH instead.
Vulnerability Insight
rexec (remote execution client for an exec server) has the same kind of functionality that rsh
has: you can execute shell commands on a remote computer.
The main dierence is that rexec authenticate by reading the username and password *unen-
crypted* from the socket.
References
cve: CVE-1999-0618
[ return to 10.0.0.11 ]
Summary
Apache Tomcat is prone to a remote code execution (RCE) vulnerability (dubbed 'Ghostcat') in
the AJP connector.
a:link, a:visited {
color: blue
. . . continues on next page . . .
2 RESULTS PER HOST 10
td.menu {
background: #FFDC75;
}
.center {
text-align: center;
}
.code {
color: #000000;
font-family: "Courier New", Courier, monospace;
font-size: 110%;
margin-left: 2.5em;
}
#banner {
margin-bottom: 12px;
}
p#congrats {
margin-top: 0;
font-weight: bold;
text-align: center;
}
p#footer {
text-align: right;
font-size: 80%;
}
/*]]>*/
</style>
</head>
<body>
<!-- Header -->
<table id="banner" width="100%">
<tr>
<td align="left" style="width:130px">
. . . continues on next page . . .
2 RESULTS PER HOST 11
<br/>
<table width="100%" border="1" cellspacing="0" cellpadding="3">
<tr>
<th>Tomcat Online</th>
</tr>
<tr>
<td class="menu">
<a href="http://tomcat.apache.org/">Home Page</a><br/>
<a href="http://tomcat.apache.org/faq/">FAQ</a><br/>
<a href="http://tomcat.apache.org/bugreport.html">Bug D
,→atabase</a><br/>
<a href="http://issues.apache.org/bugzilla/buglist.cgi?bug_s
,→tatus=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=RE
,→OPENED&bug_status=RESOLVED&resolution=LATER&resolution=REMIND&
,→resolution=---&bugidtype=include&product=Tomcat+5&cmdtype=doit&
,→;order=Importance">Open Bugs</a><br/>
<a href="http://mail-archives.apache.org/mod_mbox/tomcat-use
,→rs/">Users Mailing List</a><br/>
<a href="http://mail-archives.apache.org/mod_mbox/tomcat-dev
,→/">Developers Mailing List</a><br/>
<a href="irc://irc.freenode.net/#tomcat">IRC</a><br/>
</td>
</tr>
</table>
<br/>
<table width="100%" border="1" cellspacing="0" cellpadding="3">
<tr>
<th>Examples</th>
</tr>
<tr>
<td class="menu">
<a href="jsp-examples/">JSP Examples</a><br/>
<a href="servlets-examples/">Servlet Examples</a><br/>
<a href="webdav/">WebDAV capabilities</a><br/>
</td>
</tr>
</table>
<br/>
<table width="100%" border="1" cellspacing="0" cellpadding="3">
<tr>
<th>Miscellaneous</th>
</tr>
. . . continues on next page . . .
2 RESULTS PER HOST 13
<p>As you may have guessed by now, this is the default Tomcat home pag
,→e. It can be found on the local filesystem at:</p>
<p class="code">$CATALINA_HOME/webapps/ROOT/index.jsp</p>
Solution:
Solution type: VendorFix
Update Apache Tomcat to version 7.0.100, 8.5.51, 9.0.31 or later. For other products using
Tomcat please contact the vendor for more information on xed versions.
Aected Software/OS
Apache Tomcat versions prior 7.0.100, 8.5.51 or 9.0.31 when the AJP connector is enabled.
Other products like JBoss or Wildy which are using Tomcat might be aected as well.
Vulnerability Insight
Apache Tomcat server has a le containing vulnerability, which can be used by an attacker to
read or include any les in all webapp directories on Tomcat, such as webapp conguration les
or source code.
References
cve: CVE-2020-1938
cisa: Known Exploited Vulnerability (KEV) catalog
url: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
url: https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1
,→a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E
url: https://www.chaitin.cn/en/ghostcat
url: https://www.cnvd.org.cn/flaw/show/CNVD-2020-10487
url: https://github.com/YDHCUI/CNVD-2020-10487-Tomcat-Ajp-lfi
url: https://securityboulevard.com/2020/02/patch-your-tomcat-and-jboss-instances
,→-to-protect-from-ghostcat-vulnerability-cve-2020-1938-and/
url: https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
url: https://tomcat.apache.org/tomcat-8.5-doc/changelog.html
url: https://tomcat.apache.org/tomcat-9.0-doc/changelog.html
cert-bund: WID-SEC-2024-0528
cert-bund: WID-SEC-2023-2480
cert-bund: CB-K20/0711
cert-bund: CB-K20/0705
cert-bund: CB-K20/0693
cert-bund: CB-K20/0555
cert-bund: CB-K20/0543
cert-bund: CB-K20/0154
dfn-cert: DFN-CERT-2021-1736
dfn-cert: DFN-CERT-2020-1508
. . . continues on next page . . .
2 RESULTS PER HOST 15
[ return to 10.0.0.11 ]
Summary
The Operating System (OS) on the remote host has reached the end of life (EOL) and should
not be used anymore.
Impact
An EOL version of an OS is not receiving any security updates from the vendor. Unxed security
vulnerabilities might be leveraged by an attacker to compromise the security of this host.
Solution:
Solution type: Mitigation
. . . continues on next page . . .
2 RESULTS PER HOST 16
[ return to 10.0.0.11 ]
Summary
The rlogin service allows root access without a password.
Impact
This vulnerability allows an attacker to gain complete control over the target system.
Solution:
Solution type: Mitigation
Disable the rlogin service and use alternatives like SSH instead.
Summary
This remote host is running a rlogin service.
Solution:
Solution type: Mitigation
Disable the rlogin service and use alternatives like SSH instead.
Vulnerability Insight
rlogin has several serious security problems,
- all information, including passwords, is transmitted unencrypted.
- .rlogin (or .rhosts) le is easy to misuse (potentially allowing anyone to login without a password)
References
cve: CVE-1999-0651
[ return to 10.0.0.11 ]
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 18
Solution:
Solution type: Mitigation
Change the password as soon as possible.
NVT: SSL/TLS: OpenSSL CCS Man in the Middle Security Bypass Vulnerability
Summary
OpenSSL is prone to a security bypass vulnerability.
Impact
Successfully exploiting this issue may allow attackers to obtain sensitive information by conduct-
ing a man-in-the-middle attack. This may lead to other attacks.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m and 1.0.1 before 1.0.1h.
. . . continues on next page . . .
2 RESULTS PER HOST 19
Vulnerability Insight
OpenSSL does not properly restrict processing of ChangeCipherSpec messages, which allows
man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-
OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via
a crafted TLS handshake, aka the 'CCS Injection' vulnerability.
References
cve: CVE-2014-0224
url: https://www.openssl.org/news/secadv/20140605.txt
url: http://www.securityfocus.com/bid/67899
cert-bund: WID-SEC-2023-0500
cert-bund: CB-K15/0567
cert-bund: CB-K15/0415
cert-bund: CB-K15/0384
cert-bund: CB-K15/0080
cert-bund: CB-K15/0079
cert-bund: CB-K15/0074
cert-bund: CB-K14/1617
cert-bund: CB-K14/1537
cert-bund: CB-K14/1299
cert-bund: CB-K14/1297
cert-bund: CB-K14/1294
cert-bund: CB-K14/1202
cert-bund: CB-K14/1174
cert-bund: CB-K14/1153
cert-bund: CB-K14/0876
cert-bund: CB-K14/0756
cert-bund: CB-K14/0746
cert-bund: CB-K14/0736
cert-bund: CB-K14/0722
cert-bund: CB-K14/0716
cert-bund: CB-K14/0708
cert-bund: CB-K14/0684
cert-bund: CB-K14/0683
cert-bund: CB-K14/0680
dfn-cert: DFN-CERT-2016-0388
dfn-cert: DFN-CERT-2015-0593
dfn-cert: DFN-CERT-2015-0427
dfn-cert: DFN-CERT-2015-0396
dfn-cert: DFN-CERT-2015-0082
. . . continues on next page . . .
2 RESULTS PER HOST 20
[ return to 10.0.0.11 ]
Summary
UnrealIRCd is prone to authentication spoong vulnerability.
Impact
Successful exploitation of this vulnerability will allows remote attackers to spoof certicate n-
gerprints and consequently log in as another user.
. . . continues on next page . . .
2 RESULTS PER HOST 21
Solution:
Solution type: VendorFix
Upgrade to UnrealIRCd 3.2.10.7, or 4.0.6, or later.
Aected Software/OS
UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6.
Vulnerability Insight
The aw exists due to an error in the 'm_authenticate' function in 'modules/m_sasl.c' script.
References
cve: CVE-2016-7144
url: http://seclists.org/oss-sec/2016/q3/420
url: http://www.securityfocus.com/bid/92763
url: http://www.openwall.com/lists/oss-security/2016/09/05/8
url: https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86b
,→c50ba1a34a766
url: https://bugs.unrealircd.org/main_page.php
[ return to 10.0.0.11 ]
Summary
It was possible to login into the remote MySQL using default credentials.
Solution:
Solution type: Mitigation
- Change the password as soon as possible
- Contact the vendor for other possible xes / updates
Aected Software/OS
The following products are know to use such weak credentials:
- CVE-2001-0645: Symantec/AXENT NetProwler 3.5.x
- CVE-2002-1809: Windows binary release of MySQL 3.23.2 through 3.23.52
- CVE-2004-1532: AppServ 2.5.x and earlier
- CVE-2004-2357: Proofpoint Protection Server
- CVE-2006-1451: MySQL Manager in Apple Mac OS X 10.3.9 and 10.4.6
- CVE-2007-2554: Associated Press (AP) Newspower 4.0.1 and earlier
- CVE-2007-6081: AdventNet EventLog Analyzer build 4030
- CVE-2009-0919: XAMPP
- CVE-2014-3419: Infoblox NetMRI before 6.8.5
- CVE-2015-4669: Xsuite 2.x
- CVE-2016-6531, CVE-2018-15719: Open Dental before version 18.4
- CVE-2024-22901: Vinchin Backup & Recovery 7.2 and prior
Other products might be aected as well.
References
cve: CVE-2001-0645
cve: CVE-2002-1809
cve: CVE-2004-1532
. . . continues on next page . . .
2 RESULTS PER HOST 23
[ return to 10.0.0.11 ]
Summary
A backdoor is installed on the remote host.
Impact
Attackers can exploit this issue to execute arbitrary commands in the context of the application.
Successful attacks will compromise the aected isystem.
Solution:
Solution type: Workaround
A whole cleanup of the infected system is recommended.
[ return to 10.0.0.11 ]
Summary
vsftpd is prone to a backdoor vulnerability.
Impact
Attackers can exploit this issue to execute arbitrary commands in the context of the application.
Successful attacks will compromise the aected application.
Solution:
Solution type: VendorFix
The repaired package can be downloaded from the referenced vendor homepage. Please validate
the package with its signature.
Aected Software/OS
The vsftpd 2.3.4 source package downloaded between 20110630 and 20110703 is aected.
Vulnerability Insight
The tainted source package contains a backdoor which opens a shell on port 6200/tcp.
References
cve: CVE-2011-2523
url: https://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backd
,→oored.html
url: https://web.archive.org/web/20210127090551/https://www.securityfocus.com/bi
,→d/48539/
url: https://security.appspot.com/vsftpd.html
[ return to 10.0.0.11 ]
Summary
This remote host is running a rsh service.
Solution:
Solution type: Mitigation
Disable the rsh service and use alternatives like SSH instead.
Vulnerability Insight
rsh (remote shell) is a command line computer program which can execute shell commands as
another user, and on another computer across a computer network.
Remark: NIST don't see 'conguration issues' as software aws so the referenced CVE has a
severity of 0.0. The severity of this VT has been raised by Greenbone to still report a conguration
issue on the target.
References
cve: CVE-1999-0651
[ return to 10.0.0.11 ]
Summary
DistCC is prone to a remote code execution (RCE) vulnerability.
Impact
DistCC by default trusts its clients completely that in turn could allow a malicious client to
execute arbitrary commands on the server.
Solution:
Solution type: VendorFix
Vendor updates are available. Please see the references for more information.
For more information about DistCC's security see the references.
Vulnerability Insight
DistCC 2.x, as used in XCode 1.5 and others, when not congured to restrict access to the server
port, allows remote attackers to execute arbitrary commands via compilation jobs, which are
executed by the server without authorization checks.
References
cve: CVE-2004-2687
url: https://distcc.github.io/security.html
url: https://web.archive.org/web/20150511045306/http://archives.neohapsis.com:80
,→/archives/bugtraq/2005-03/0183.html
dfn-cert: DFN-CERT-2019-0381
[ return to 10.0.0.11 ]
Impact
Attackers can exploit this issue to execute arbitrary commands in the context of the application.
Successful attacks will compromise the aected application.
Solution:
Solution type: VendorFix
The repaired package can be downloaded from the referenced vendor homepage. Please validate
the package with its signature.
Aected Software/OS
The vsftpd 2.3.4 source package downloaded between 20110630 and 20110703 is aected.
Vulnerability Insight
The tainted source package contains a backdoor which opens a shell on port 6200/tcp.
References
cve: CVE-2011-2523
url: https://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backd
,→oored.html
url: https://web.archive.org/web/20210127090551/https://www.securityfocus.com/bi
,→d/48539/
url: https://security.appspot.com/vsftpd.html
2 RESULTS PER HOST 28
Summary
It was possible to login into the remote FTP server using weak/known credentials.
Impact
This issue may be exploited by a remote attacker to e.g. gain access to sensitive information or
modify system conguration.
Solution:
Solution type: Mitigation
Change the password as soon as possible.
Vulnerability Insight
The following devices are / software is known to be aected:
- CVE-2001-1594: Codonics printer FTP service as used in GE Healthcare eNTEGRA P&R
- CVE-2013-7404: GE Healthcare Discovery NM 750b
- CVE-2014-9198: Schneider Electric ETG3000 FactoryCast HMI gateways
- CVE-2015-7261: QNAP iArtist Lite distributed with QNAP Signage Station
- CVE-2016-8731: Foscam C1 devices
- CVE-2017-8218: vsftpd on TP-Link C2 and C20i devices
- CVE-2018-9068: IMM2 for IBM and Lenovo System x
- CVE-2018-17771: Ingenico Telium 2 PoS terminals
- CVE-2018-19063, CVE-2018-19064: Foscam C2 and Opticam i5 devices
Note: As the VT 'FTP Brute Force Logins' (OID: 1.3.6.1.4.1.25623.1.0.108717) might run into
a timeout the actual reporting of this vulnerability takes place in this VT instead.
References
. . . continues on next page . . .
2 RESULTS PER HOST 29
[ return to 10.0.0.11 ]
Summary
TWiki is prone to Cross-Site Scripting (XSS) and Command Execution Vulnerabilities.
Impact
Successful exploitation could allow execution of arbitrary script code or commands. This could
let attackers steal cookie-based authentication credentials or compromise the aected application.
Solution:
Solution type: VendorFix
Upgrade to version 4.2.4 or later.
Aected Software/OS
TWiki, TWiki version prior to 4.2.4.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 30
References
cve: CVE-2008-5304
cve: CVE-2008-5305
url: http://twiki.org/cgi-bin/view/Codev.SecurityAlert-CVE-2008-5304
url: http://www.securityfocus.com/bid/32668
url: http://www.securityfocus.com/bid/32669
url: http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2008-5305
NVT: PHP < 5.3.13, 5.4.x < 5.4.3 Multiple Vulnerabilities - Active Check
Summary
PHP is prone to multiple vulnerabilities.
Impact
Exploiting this issue allows remote attackers to view the source code of les in the context of the
server process. This may allow the attacker to obtain sensitive information and to run arbitrary
PHP code on the aected computer. Other attacks are also possible.
Solution:
Solution type: VendorFix
Update to version 5.3.13, 5.4.3 or later.
Aected Software/OS
PHP versions prior to 5.3.13 and 5.4.x prior to 5.4.3.
Vulnerability Insight
When PHP is used in a CGI-based setup (such as Apache's mod_cgid), the php-cgi receives
a processed query string parameter as command line arguments which allows command-line
switches, such as -s, -d or -c to be passed to the php-cgi binary, which can be exploited to
disclose source code and obtain arbitrary code execution.
An example of the -s command, allowing an attacker to view the source code of index.php is
below:
http://example.com/index.php?-s
References
cve: CVE-2012-1823
cve: CVE-2012-2311
cve: CVE-2012-2336
cve: CVE-2012-2335
url: https://web.archive.org/web/20190212080415/http://eindbazen.net/2012/05/php
,→-cgi-advisory-cve-2012-1823/
url: https://www.kb.cert.org/vuls/id/520827
url: https://bugs.php.net/bug.php?id=61910
url: https://www.php.net/manual/en/security.cgi-bin.php
url: https://web.archive.org/web/20210121223743/http://www.securityfocus.com/bid
,→/53388
url: https://web.archive.org/web/20120709064615/http://www.h-online.com/open/new
,→s/item/Critical-open-hole-in-PHP-creates-risks-Update-2-1567532.html
url: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
. . . continues on next page . . .
2 RESULTS PER HOST 32
Summary
Miscongured web servers allows remote clients to perform dangerous HTTP methods such as
PUT and DELETE.
Impact
- Enabled PUT method: This might allow an attacker to upload and run arbitrary code on this
web server.
- Enabled DELETE method: This might allow an attacker to delete additional les on this web
server.
Solution:
Solution type: Mitigation
. . . continues on next page . . .
2 RESULTS PER HOST 33
Aected Software/OS
Web servers with enabled PUT and/or DELETE methods.
References
url: http://www.securityfocus.com/bid/12141
owasp: OWASP-CM-001
[ return to 10.0.0.11 ]
Summary
The remote host is running a VNC server providing one or more insecure or cryptographically
weak Security Type(s) not intended for use on untrusted networks.
Impact
An attacker can uncover sensitive data by sning trac to the VNC server.
Solution:
Solution type: Mitigation
Run the session over an encrypted channel provided by IPsec [RFC4301] or SSH [RFC4254].
Some VNC server vendors are also providing more secure Security Types within their products.
References
url: https://tools.ietf.org/html/rfc6143#page-10
[ return to 10.0.0.11 ]
Summary
The remote host is running a FTP service that allows cleartext logins over unencrypted connec-
tions.
Impact
An attacker can uncover login names and passwords by sning trac to the FTP service.
Solution:
Solution type: Mitigation
Enable FTPS or enforce the connection via the 'AUTH TLS' command. Please see the manual
of the FTP service for more information.
[ return to 10.0.0.11 ]
2 RESULTS PER HOST 35
Summary
The remote SSH server is congured to allow / support weak key exchange (KEX) algorithm(s).
Impact
An attacker can quickly break individual connections.
Solution:
Solution type: Mitigation
Disable the reported weak KEX algorithm(s)
- 1024-bit MODP group / prime KEX algorithms:
Alternatively use elliptic-curve Die-Hellmann in general, e.g. Curve 25519.
Vulnerability Insight
- 1024-bit MODP group / prime KEX algorithms:
Millions of HTTPS, SSH, and VPN servers all use the same prime numbers for Die-Hellman
key exchange. Practitioners believed this was safe as long as new key exchange messages were
generated for every connection. However, the rst step in the number eld sieve-the most ecient
algorithm for breaking a Die-Hellman connection-is dependent only on this prime.
A nation-state can break a 1024-bit prime.
References
url: https://weakdh.org/sysadmin.html
url: https://www.rfc-editor.org/rfc/rfc9142
url: https://www.rfc-editor.org/rfc/rfc9142#name-summary-guidance-for-implem
url: https://www.rfc-editor.org/rfc/rfc6194
url: https://www.rfc-editor.org/rfc/rfc4253#section-6.5
Summary
The remote SSH server is congured to allow / support weak host key algorithm(s).
Solution:
Solution type: Mitigation
Disable the reported weak host key algorithm(s).
. . . continues on next page . . .
2 RESULTS PER HOST 37
References
url: https://www.rfc-editor.org/rfc/rfc8332
url: https://www.rfc-editor.org/rfc/rfc8709
url: https://www.rfc-editor.org/rfc/rfc4253#section-6.6
Summary
The remote SSH server is congured to allow / support weak encryption algorithm(s).
Solution:
Solution type: Mitigation
Disable the reported weak encryption algorithm(s).
Vulnerability Insight
- The 'arcfour' cipher is the Arcfour stream cipher with 128-bit keys. The Arcfour cipher is
believed to be compatible with the RC4 cipher [SCHNEIER]. Arcfour (and RC4) has problems
with weak keys, and should not be used anymore.
- The 'none' algorithm species that no encryption is to be done. Note that this method provides
no condentiality protection, and it is NOT RECOMMENDED to use it.
- A vulnerability exists in SSH messages that employ CBC mode that may allow an attacker to
recover plaintext from a block of ciphertext.
[ return to 10.0.0.11 ]
Summary
The remote host is running a Telnet service that allows cleartext logins over unencrypted con-
nections.
Impact
An attacker can uncover login names and passwords by sning trac to the Telnet service.
Solution:
Solution type: Mitigation
Replace Telnet with a protocol like SSH which supports encrypted connections.
[ return to 10.0.0.11 ]
Summary
It was possible to detect the usage of the deprecated SSLv2 and/or SSLv3 protocol on this
system.
Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.
Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
anymore.
Solution:
Solution type: Mitigation
It is recommended to disable the deprecated SSLv2 and/or SSLv3 protocols in favor of the
TLSv1.2+ protocols. Please see the references for more information.
Aected Software/OS
All services providing an encrypted communication using the SSLv2 and/or SSLv3 protocols.
Vulnerability Insight
The SSLv2 and SSLv3 protocols contain known cryptographic aws like:
- CVE-2014-3566: Padding Oracle On Downgraded Legacy Encryption (POODLE)
- CVE-2016-0800: Decrypting RSA with Obsolete and Weakened eNcryption (DROWN)
References
cve: CVE-2016-0800
cve: CVE-2014-3566
url: https://ssl-config.mozilla.org/
url: https://bettercrypto.org/
url: https://drownattack.com/
url: https://www.imperialviolet.org/2014/10/14/poodle.html
url: https://www.enisa.europa.eu/publications/algorithms-key-size-and-parameters
,→-report-2014
cert-bund: WID-SEC-2023-0431
cert-bund: WID-SEC-2023-0427
cert-bund: CB-K18/0094
cert-bund: CB-K17/1198
cert-bund: CB-K17/1196
cert-bund: CB-K16/1828
cert-bund: CB-K16/1438
cert-bund: CB-K16/1384
cert-bund: CB-K16/1141
cert-bund: CB-K16/1107
cert-bund: CB-K16/1102
cert-bund: CB-K16/0792
cert-bund: CB-K16/0599
cert-bund: CB-K16/0597
cert-bund: CB-K16/0459
cert-bund: CB-K16/0456
cert-bund: CB-K16/0433
cert-bund: CB-K16/0424
cert-bund: CB-K16/0415
cert-bund: CB-K16/0413
cert-bund: CB-K16/0374
cert-bund: CB-K16/0367
cert-bund: CB-K16/0331
cert-bund: CB-K16/0329
cert-bund: CB-K16/0328
cert-bund: CB-K16/0156
cert-bund: CB-K15/1514
cert-bund: CB-K15/1358
cert-bund: CB-K15/1021
cert-bund: CB-K15/0972
cert-bund: CB-K15/0637
cert-bund: CB-K15/0590
cert-bund: CB-K15/0525
cert-bund: CB-K15/0393
cert-bund: CB-K15/0384
. . . continues on next page . . .
2 RESULTS PER HOST 42
Summary
This routine reports all Weak SSL/TLS cipher suites accepted by a service.
NOTE: No severity for SMTP services with 'Opportunistic TLS' and weak cipher suites on port
25/tcp is reported. If too strong cipher suites are congured for this service the alternative would
be to fall back to an even more insecure cleartext communication.
Solution:
Solution type: Mitigation
The conguration of this services should be changed so that it does not accept the listed weak
cipher suites anymore.
Please see the references for more resources supporting you with this task.
Vulnerability Insight
These rules are applied for the evaluation of the cryptographic strength:
- RC4 is considered to be weak (CVE-2013-2566, CVE-2015-2808)
- Ciphers using 64 bit or less are considered to be vulnerable to brute force methods and therefore
considered as weak (CVE-2015-4000)
- 1024 bit RSA authentication is considered to be insecure and therefore as weak
- Any cipher considered to be secure for only the next 10 years is considered as medium
- Any other cipher is considered as strong
References
cve: CVE-2013-2566
cve: CVE-2015-2808
cve: CVE-2015-4000
url: https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/warnmeldung_cb-k16-1
,→465_update_6.html
url: https://bettercrypto.org/
url: https://mozilla.github.io/server-side-tls/ssl-config-generator/
cert-bund: CB-K21/0067
cert-bund: CB-K19/0812
cert-bund: CB-K17/1750
cert-bund: CB-K16/1593
cert-bund: CB-K16/1552
cert-bund: CB-K16/1102
cert-bund: CB-K16/0617
cert-bund: CB-K16/0599
. . . continues on next page . . .
2 RESULTS PER HOST 45
NVT: SSL/TLS: Server Certicate / Certicate in Chain with RSA keys less than 2048 bits
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 47
Impact
Using certicates with weak RSA key size can lead to unauthorized exposure of sensitive infor-
mation.
Solution:
Solution type: Mitigation
Replace the certicate with a stronger key and reissue the certicates it signed.
Vulnerability Insight
SSL/TLS certicates using RSA keys with less than 2048 bits are considered unsafe.
References
url: https://www.cabforum.org/wp-content/uploads/Baseline_Requirements_V1.pdf
Summary
The remote SSL/TLS service is prone to a denial of service (DoS) vulnerability.
Impact
The aw might make it easier for remote attackers to cause a DoS (CPU consumption) by
performing many renegotiations within a single connection.
Solution:
Solution type: VendorFix
Users should contact their vendors for specic patch information.
A general solution is to remove/disable renegotiation capabilities altogether from/in the aected
SSL/TLS service.
Aected Software/OS
Every SSL/TLS service which does not properly restrict client-initiated renegotiation.
Vulnerability Insight
The aw exists because the remote SSL/TLS service does not properly restrict client-initiated
renegotiation within the SSL and TLS protocols.
Note: The referenced CVEs are aecting OpenSSL and Mozilla Network Security Services (NSS)
but both are in a DISPUTED state with the following rationale:
> It can also be argued that it is the responsibility of server deployments, not a security library,
to prevent or limit renegotiation when it is inappropriate within a specic environment.
Both CVEs are still kept in this VT as a reference to the origin of this aw.
References
cve: CVE-2011-1473
cve: CVE-2011-5094
url: https://web.archive.org/web/20211201133213/https://orchilles.com/ssl-renego
,→tiation-dos/
url: https://mailarchive.ietf.org/arch/msg/tls/wdg46VE_jkYBbgJ5yE4P9nQ-8IU/
url: https://vincent.bernat.ch/en/blog/2011-ssl-dos-mitigation
url: https://www.openwall.com/lists/oss-security/2011/07/08/2
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0796
. . . continues on next page . . .
2 RESULTS PER HOST 49
Summary
The remote server's SSL/TLS certicate has already expired.
Solution:
Solution type: Mitigation
Replace the SSL/TLS certicate by a new one.
Vulnerability Insight
This script checks expiry dates of certicates associated with SSL/TLS-enabled services on the
target and reports whether any have already expired.
Summary
It was possible to detect the usage of the deprecated TLSv1.0 and/or TLSv1.1 protocol on this
system.
Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.
. . . continues on next page . . .
2 RESULTS PER HOST 51
Solution:
Solution type: Mitigation
It is recommended to disable the deprecated TLSv1.0 and/or TLSv1.1 protocols in favor of the
TLSv1.2+ protocols. Please see the references for more information.
Aected Software/OS
All services providing an encrypted communication using the TLSv1.0 and/or TLSv1.1 protocols.
Vulnerability Insight
The TLSv1.0 and TLSv1.1 protocols contain known cryptographic aws like:
- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)
- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded
Legacy Encryption (FREAK)
References
cve: CVE-2011-3389
cve: CVE-2015-0204
url: https://ssl-config.mozilla.org/
url: https://bettercrypto.org/
url: https://datatracker.ietf.org/doc/rfc8996/
url: https://vnhacker.blogspot.com/2011/09/beast.html
url: https://web.archive.org/web/20201108095603/https://censys.io/blog/freak
url: https://www.enisa.europa.eu/publications/algorithms-key-size-and-parameters
,→-report-2014
cert-bund: WID-SEC-2023-1435
cert-bund: CB-K18/0799
cert-bund: CB-K16/1289
cert-bund: CB-K16/1096
cert-bund: CB-K15/1751
cert-bund: CB-K15/1266
cert-bund: CB-K15/0850
. . . continues on next page . . .
2 RESULTS PER HOST 52
Summary
The remote service is using a SSL/TLS certicate in the certicate chain that has been signed
using a cryptographically weak hashing algorithm.
Solution:
Solution type: Mitigation
Servers that use SSL/TLS certicates signed with a weak SHA-1, MD5, MD4 or MD2 hashing
algorithm will need to obtain new SHA-2 signed SSL/TLS certicates to avoid web browser
SSL/TLS certicate warnings.
Vulnerability Insight
The following hashing algorithms used for signing SSL/TLS certicates are considered crypto-
graphically weak and not secure enough for ongoing use:
- Secure Hash Algorithm 1 (SHA-1)
- Message Digest 5 (MD5)
- Message Digest 4 (MD4)
- Message Digest 2 (MD2)
Beginning as late as January 2017 and as early as June 2016, browser developers such as Microsoft
and Google will begin warning users when visiting web sites that use SHA-1 signed Secure Socket
Layer (SSL) certicates.
NOTE: The script preference allows to set one or more custom SHA-1 ngerprints of CA certi-
cates which are trusted by this routine. The ngerprints needs to be passed comma-separated
and case-insensitive:
Fingerprint1
or
ngerprint1, Fingerprint2
References
url: https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-
,→sha-1-based-signature-algorithms/
Summary
The SSL/TLS service uses Die-Hellman groups with insucient strength (key size < 2048).
Impact
An attacker might be able to decrypt the SSL/TLS communication oine.
Solution:
Solution type: Workaround
Deploy (Ephemeral) Elliptic-Curve Die-Hellman (ECDHE) or use a 2048-bit or stronger Die-
Hellman group (see the references).
For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which
include primes with lengths of more than 1024 bits.
Vulnerability Insight
The Die-Hellman group are some big numbers that are used as base for the DH computations.
They can be, and often are, xed. The security of the nal secret depends on the size of these
parameters. It was found that 512 and 768 bits to be weak, 1024 bits to be breakable by really
powerful attackers like governments.
References
url: https://weakdh.org/
url: https://weakdh.org/sysadmin.html
[ return to 10.0.0.11 ]
2 RESULTS PER HOST 56
Summary
Reports if the remote FTP Server allows anonymous logins.
Impact
Based on the les accessible via this anonymous FTP login and the permissions of this account
an attacker might be able to:
- gain access to sensitive les
- upload or delete les.
Solution:
Solution type: Mitigation
If you do not want to share les, you should disable anonymous logins.
Vulnerability Insight
A host that provides an FTP service may additionally provide Anonymous FTP access as well.
Under this arrangement, users do not strictly need an account on the host. Instead the user
typically enters 'anonymous' or 'ftp' when prompted for username. Although users are commonly
asked to send their email address as their password, little to no verication is actually performed
on the supplied data.
Remark: NIST don't see 'conguration issues' as software aws so the referenced CVE has a
severity of 0.0. The severity of this VT has been raised by Greenbone to still report a conguration
issue on the target.
References
cve: CVE-1999-0497
2 RESULTS PER HOST 57
Summary
The remote host is running a FTP service that allows cleartext logins over unencrypted connec-
tions.
Impact
An attacker can uncover login names and passwords by sning trac to the FTP service.
Solution:
Solution type: Mitigation
Enable FTPS or enforce the connection via the 'AUTH TLS' command. Please see the manual
of the FTP service for more information.
[ return to 10.0.0.11 ]
Summary
Multiple vendors' implementations of 'STARTTLS' are prone to a vulnerability that lets attackers
inject arbitrary commands.
. . . continues on next page . . .
2 RESULTS PER HOST 58
Impact
An attacker can exploit this issue to execute arbitrary commands in the context of the user
running the application. Successful exploits can allow attackers to obtain email usernames and
passwords.
Solution:
Solution type: VendorFix
Updates are available. Please see the references for more information.
Aected Software/OS
The following vendors are known to be aected:
Ipswitch
Kerio
Postx
Qmail-TLS
Oracle
SCO Group
spamdyke
ISC
References
cve: CVE-2011-0411
cve: CVE-2011-1430
cve: CVE-2011-1431
cve: CVE-2011-1432
cve: CVE-2011-1506
cve: CVE-2011-1575
cve: CVE-2011-1926
cve: CVE-2011-2165
url: http://www.securityfocus.com/bid/46767
url: http://kolab.org/pipermail/kolab-announce/2011/000101.html
url: http://bugzilla.cyrusimap.org/show_bug.cgi?id=3424
url: http://cyrusimap.org/mediawiki/index.php/Bugs_Resolved_in_2.4.7
. . . continues on next page . . .
2 RESULTS PER HOST 59
Summary
. . . continues on next page . . .
2 RESULTS PER HOST 60
Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.
Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
anymore.
Solution:
Solution type: Mitigation
It is recommended to disable the deprecated SSLv2 and/or SSLv3 protocols in favor of the
TLSv1.2+ protocols. Please see the references for more information.
Aected Software/OS
All services providing an encrypted communication using the SSLv2 and/or SSLv3 protocols.
Vulnerability Insight
The SSLv2 and SSLv3 protocols contain known cryptographic aws like:
- CVE-2014-3566: Padding Oracle On Downgraded Legacy Encryption (POODLE)
- CVE-2016-0800: Decrypting RSA with Obsolete and Weakened eNcryption (DROWN)
References
cve: CVE-2016-0800
cve: CVE-2014-3566
. . . continues on next page . . .
2 RESULTS PER HOST 61
NVT: SSL/TLS: Server Certicate / Certicate in Chain with RSA keys less than 2048 bits
Summary
The remote SSL/TLS server certicate and/or any of the certicates in the certicate chain is
using a RSA key with less than 2048 bits.
Impact
Using certicates with weak RSA key size can lead to unauthorized exposure of sensitive infor-
mation.
Solution:
Solution type: Mitigation
Replace the certicate with a stronger key and reissue the certicates it signed.
. . . continues on next page . . .
2 RESULTS PER HOST 64
Vulnerability Insight
SSL/TLS certicates using RSA keys with less than 2048 bits are considered unsafe.
References
url: https://www.cabforum.org/wp-content/uploads/Baseline_Requirements_V1.pdf
Summary
The Mailserver on this host answers to VRFY and/or EXPN requests.
Solution:
Solution type: Workaround
Disable VRFY and/or EXPN on your Mailserver.
For postx add 'disable_vrfy_command=yes' in 'main.cf '.
For Sendmail add the option 'O PrivacyOptions=goaway'.
It is suggested that, if you really want to publish this type of information, you use a mechanism
that legitimate users actually know about, such as Finger or HTTP.
Vulnerability Insight
VRFY and EXPN ask the server for information about an address. They are inherently unusable
through rewalls, gateways, mail exchangers for part-time hosts, etc.
Summary
The remote SSL/TLS service is prone to a denial of service (DoS) vulnerability.
Impact
The aw might make it easier for remote attackers to cause a DoS (CPU consumption) by
performing many renegotiations within a single connection.
Solution:
Solution type: VendorFix
Users should contact their vendors for specic patch information.
A general solution is to remove/disable renegotiation capabilities altogether from/in the aected
SSL/TLS service.
Aected Software/OS
Every SSL/TLS service which does not properly restrict client-initiated renegotiation.
Vulnerability Insight
The aw exists because the remote SSL/TLS service does not properly restrict client-initiated
renegotiation within the SSL and TLS protocols.
Note: The referenced CVEs are aecting OpenSSL and Mozilla Network Security Services (NSS)
but both are in a DISPUTED state with the following rationale:
> It can also be argued that it is the responsibility of server deployments, not a security library,
to prevent or limit renegotiation when it is inappropriate within a specic environment.
Both CVEs are still kept in this VT as a reference to the origin of this aw.
References
cve: CVE-2011-1473
cve: CVE-2011-5094
url: https://web.archive.org/web/20211201133213/https://orchilles.com/ssl-renego
,→tiation-dos/
url: https://mailarchive.ietf.org/arch/msg/tls/wdg46VE_jkYBbgJ5yE4P9nQ-8IU/
url: https://vincent.bernat.ch/en/blog/2011-ssl-dos-mitigation
url: https://www.openwall.com/lists/oss-security/2011/07/08/2
cert-bund: WID-SEC-2024-1591
cert-bund: WID-SEC-2024-0796
cert-bund: WID-SEC-2023-1435
cert-bund: CB-K17/0980
cert-bund: CB-K17/0979
cert-bund: CB-K14/0772
cert-bund: CB-K13/0915
cert-bund: CB-K13/0462
dfn-cert: DFN-CERT-2017-1013
dfn-cert: DFN-CERT-2017-1012
dfn-cert: DFN-CERT-2014-0809
dfn-cert: DFN-CERT-2013-1928
dfn-cert: DFN-CERT-2012-1112
Summary
The remote server's SSL/TLS certicate has already expired.
Solution:
Solution type: Mitigation
Replace the SSL/TLS certicate by a new one.
Vulnerability Insight
This script checks expiry dates of certicates associated with SSL/TLS-enabled services on the
target and reports whether any have already expired.
NVT: SSL/TLS: RSA Temporary Key Handling 'RSA_EXPORT' Downgrade Issue (FREAK)
Impact
Successful exploitation will allow remote attacker to downgrade the security of a session to use
'RSA_EXPORT' cipher suites, which are signicantly weaker than non-export cipher suites.
This may allow a man-in-the-middle attacker to more easily break the encryption and monitor
or tamper with the encrypted stream.
Solution:
Solution type: VendorFix
- Remove support for 'RSA_EXPORT' cipher suites from the service.
- If running OpenSSL update to version 0.9.8zd or 1.0.0p or 1.0.1k or later.
Aected Software/OS
- Hosts accepting 'RSA_EXPORT' cipher suites
- OpenSSL version before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k.
Vulnerability Insight
Flaw is due to improper handling RSA temporary keys in a non-export RSA key exchange cipher
suite.
References
cve: CVE-2015-0204
url: https://freakattack.com
url: http://www.securityfocus.com/bid/71936
url: http://secpod.org/blog/?p=3818
url: http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-fac
,→toring-nsa.html
cert-bund: CB-K18/0799
cert-bund: CB-K16/1289
cert-bund: CB-K16/1096
cert-bund: CB-K15/1751
cert-bund: CB-K15/1266
cert-bund: CB-K15/0850
cert-bund: CB-K15/0764
cert-bund: CB-K15/0720
cert-bund: CB-K15/0548
cert-bund: CB-K15/0526
cert-bund: CB-K15/0509
cert-bund: CB-K15/0493
cert-bund: CB-K15/0384
cert-bund: CB-K15/0365
cert-bund: CB-K15/0364
cert-bund: CB-K15/0302
cert-bund: CB-K15/0192
cert-bund: CB-K15/0016
dfn-cert: DFN-CERT-2018-1408
dfn-cert: DFN-CERT-2016-1372
dfn-cert: DFN-CERT-2016-1164
dfn-cert: DFN-CERT-2016-0388
dfn-cert: DFN-CERT-2015-1853
dfn-cert: DFN-CERT-2015-1332
dfn-cert: DFN-CERT-2015-0884
dfn-cert: DFN-CERT-2015-0800
dfn-cert: DFN-CERT-2015-0758
dfn-cert: DFN-CERT-2015-0567
dfn-cert: DFN-CERT-2015-0544
dfn-cert: DFN-CERT-2015-0530
dfn-cert: DFN-CERT-2015-0396
dfn-cert: DFN-CERT-2015-0375
dfn-cert: DFN-CERT-2015-0374
dfn-cert: DFN-CERT-2015-0305
dfn-cert: DFN-CERT-2015-0199
dfn-cert: DFN-CERT-2015-0021
2 RESULTS PER HOST 70
Summary
It was possible to detect the usage of the deprecated TLSv1.0 and/or TLSv1.1 protocol on this
system.
Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.
Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
anymore.
Solution:
Solution type: Mitigation
It is recommended to disable the deprecated TLSv1.0 and/or TLSv1.1 protocols in favor of the
TLSv1.2+ protocols. Please see the references for more information.
Aected Software/OS
All services providing an encrypted communication using the TLSv1.0 and/or TLSv1.1 protocols.
Vulnerability Insight
The TLSv1.0 and TLSv1.1 protocols contain known cryptographic aws like:
- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)
- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded
Legacy Encryption (FREAK)
References
cve: CVE-2011-3389
cve: CVE-2015-0204
url: https://ssl-config.mozilla.org/
url: https://bettercrypto.org/
url: https://datatracker.ietf.org/doc/rfc8996/
url: https://vnhacker.blogspot.com/2011/09/beast.html
url: https://web.archive.org/web/20201108095603/https://censys.io/blog/freak
url: https://www.enisa.europa.eu/publications/algorithms-key-size-and-parameters
,→-report-2014
cert-bund: WID-SEC-2023-1435
cert-bund: CB-K18/0799
cert-bund: CB-K16/1289
cert-bund: CB-K16/1096
cert-bund: CB-K15/1751
cert-bund: CB-K15/1266
cert-bund: CB-K15/0850
cert-bund: CB-K15/0764
cert-bund: CB-K15/0720
cert-bund: CB-K15/0548
cert-bund: CB-K15/0526
cert-bund: CB-K15/0509
cert-bund: CB-K15/0493
cert-bund: CB-K15/0384
cert-bund: CB-K15/0365
cert-bund: CB-K15/0364
cert-bund: CB-K15/0302
cert-bund: CB-K15/0192
cert-bund: CB-K15/0079
cert-bund: CB-K15/0016
cert-bund: CB-K14/1342
cert-bund: CB-K14/0231
cert-bund: CB-K13/0845
cert-bund: CB-K13/0796
cert-bund: CB-K13/0790
dfn-cert: DFN-CERT-2020-0177
dfn-cert: DFN-CERT-2020-0111
dfn-cert: DFN-CERT-2019-0068
dfn-cert: DFN-CERT-2018-1441
dfn-cert: DFN-CERT-2018-1408
. . . continues on next page . . .
2 RESULTS PER HOST 72
Summary
The SSL/TLS service uses Die-Hellman groups with insucient strength (key size < 2048).
Impact
An attacker might be able to decrypt the SSL/TLS communication oine.
Solution:
Solution type: Workaround
Deploy (Ephemeral) Elliptic-Curve Die-Hellman (ECDHE) or use a 2048-bit or stronger Die-
Hellman group (see the references).
For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which
include primes with lengths of more than 1024 bits.
. . . continues on next page . . .
2 RESULTS PER HOST 74
Vulnerability Insight
The Die-Hellman group are some big numbers that are used as base for the DH computations.
They can be, and often are, xed. The security of the nal secret depends on the size of these
parameters. It was found that 512 and 768 bits to be weak, 1024 bits to be breakable by really
powerful attackers like governments.
References
url: https://weakdh.org/
url: https://weakdh.org/sysadmin.html
Summary
The remote service is using a SSL/TLS certicate in the certicate chain that has been signed
using a cryptographically weak hashing algorithm.
Solution:
Solution type: Mitigation
Servers that use SSL/TLS certicates signed with a weak SHA-1, MD5, MD4 or MD2 hashing
algorithm will need to obtain new SHA-2 signed SSL/TLS certicates to avoid web browser
SSL/TLS certicate warnings.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 75
References
url: https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-
,→sha-1-based-signature-algorithms/
[ return to 10.0.0.11 ]
NVT: Samba MS-RPC Remote Shell Command Execution Vulnerability - Active Check
Summary
Samba is prone to a vulnerability that allows attackers to execute arbitrary shell commands
because the software fails to sanitize user-supplied input.
Impact
An attacker may leverage this issue to execute arbitrary shell commands on an aected system
with the privileges of the application.
Solution:
Solution type: VendorFix
Updates are available. Please see the referenced vendor advisory.
Aected Software/OS
This issue aects Samba 3.0.0 through 3.0.25rc3.
References
cve: CVE-2007-2447
url: http://www.securityfocus.com/bid/23972
url: https://www.samba.org/samba/security/CVE-2007-2447.html
[ return to 10.0.0.11 ]
Summary
TWiki is prone to a cross-site request forgery (CSRF) vulnerability.
Impact
Successful exploitation will allow attacker to gain administrative privileges on the target appli-
cation and can cause CSRF attack.
Solution:
Solution type: VendorFix
Upgrade to TWiki version 4.3.2 or later.
Aected Software/OS
TWiki version prior to 4.3.2
Vulnerability Insight
Attack can be done by tricking an authenticated TWiki user into visiting a static HTML page on
another side, where a Javascript enabled browser will send an HTTP POST request to TWiki,
which in turn will process the request as the TWiki user.
References
cve: CVE-2009-4898
url: http://www.openwall.com/lists/oss-security/2010/08/03/8
url: http://www.openwall.com/lists/oss-security/2010/08/02/17
url: http://twiki.org/cgi-bin/view/Codev/SecurityAuditTokenBasedCsrfFix
url: http://twiki.org/cgi-bin/view/Codev/DownloadTWiki
Solution:
Solution type: VendorFix
Update to version 1.9.0 or later.
Aected Software/OS
jQuery prior to version 1.9.0.
Vulnerability Insight
The jQuery(strInput) function does not dierentiate selectors from HTML in a reliable fashion.
In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<'
character anywhere in the string, giving attackers more exibility when attempting to construct
a malicious payload. In xed versions, jQuery only deems the input to be HTML if it explic-
itly starts with the '<' character, limiting exploitability only to attackers who can control the
beginning of a string, which is far less common.
References
cve: CVE-2012-6708
url: https://bugs.jquery.com/ticket/11290
cert-bund: WID-SEC-2022-0673
cert-bund: CB-K22/0045
cert-bund: CB-K18/1131
dfn-cert: DFN-CERT-2023-1197
dfn-cert: DFN-CERT-2020-0590
2 RESULTS PER HOST 79
Summary
bin/statistics in TWiki 6.0.2 allows XSS via the webs parameter.
Solution:
Solution type: VendorFix
Update to version 6.1.0 or later.
Aected Software/OS
TWiki version 6.0.2 and probably prior.
References
cve: CVE-2018-20212
url: https://seclists.org/fulldisclosure/2019/Jan/7
url: http://twiki.org/cgi-bin/view/Codev/DownloadTWiki
Summary
TWiki is prone to a cross-site request forgery (CSRF) vulnerability.
Impact
. . . continues on next page . . .
2 RESULTS PER HOST 80
Solution:
Solution type: VendorFix
Upgrade to version 4.3.1 or later.
Aected Software/OS
TWiki version prior to 4.3.1
Vulnerability Insight
Remote authenticated user can create a specially crafted image tag that, when viewed by the
target user, will update pages on the target system with the privileges of the target user via
HTTP requests.
References
cve: CVE-2009-1339
url: http://secunia.com/advisories/34880
url: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526258
url: http://twiki.org/p/pub/Codev/SecurityAlert-CVE-2009-1339/TWiki-4.3.0-c-diff
,→-cve-2009-1339.txt
Summary
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK
are HTTP methods which are used to debug web server connections.
Impact
An attacker may use this aw to trick your legitimate web users to give him their credentials.
Solution:
Solution type: Mitigation
. . . continues on next page . . .
2 RESULTS PER HOST 81
Aected Software/OS
Web servers with enabled TRACE and/or TRACK methods.
Vulnerability Insight
It has been shown that web servers supporting this methods are subject to cross-site-scripting
attacks, dubbed XST for Cross-Site-Tracing, when used in conjunction with various weaknesses
in browsers.
References
cve: CVE-2003-1567
cve: CVE-2004-2320
cve: CVE-2004-2763
cve: CVE-2005-3398
cve: CVE-2006-4683
cve: CVE-2007-3008
cve: CVE-2008-7253
cve: CVE-2009-2823
cve: CVE-2010-0386
cve: CVE-2012-2223
cve: CVE-2014-7883
url: http://www.kb.cert.org/vuls/id/288308
url: http://www.securityfocus.com/bid/11604
url: http://www.securityfocus.com/bid/15222
url: http://www.securityfocus.com/bid/19915
url: http://www.securityfocus.com/bid/24456
url: http://www.securityfocus.com/bid/33374
url: http://www.securityfocus.com/bid/36956
url: http://www.securityfocus.com/bid/36990
url: http://www.securityfocus.com/bid/37995
url: http://www.securityfocus.com/bid/9506
url: http://www.securityfocus.com/bid/9561
url: http://www.kb.cert.org/vuls/id/867593
url: https://httpd.apache.org/docs/current/en/mod/core.html#traceenable
url: https://techcommunity.microsoft.com/t5/iis-support-blog/http-track-and-trac
,→e-verbs/ba-p/784482
url: https://owasp.org/www-community/attacks/Cross_Site_Tracing
cert-bund: CB-K14/0981
. . . continues on next page . . .
2 RESULTS PER HOST 82
Summary
Reporting of les containing the output of the phpinfo() PHP function previously detected via
HTTP.
Impact
Some of the information that can be gathered from this le includes:
The username of the user running the PHP process, if it is a sudo user, the IP address of the host,
the web server version, the system version (Unix, Linux, Windows, ...), and the root directory
of the web server.
Solution:
Solution type: Workaround
Delete the listed les or restrict access to them.
Aected Software/OS
All systems exposing a le containing the output of the phpinfo() PHP function.
This VT is also reporting if an aected endpoint for the following products have been identied:
. . . continues on next page . . .
2 RESULTS PER HOST 83
Vulnerability Insight
Many PHP installation tutorials instruct the user to create a le called phpinfo.php or similar
containing the phpinfo() statement. Such a le is often left back in the webserver directory.
References
cve: CVE-2008-0149
cve: CVE-2023-49282
cve: CVE-2023-49283
url: https://www.php.net/manual/en/function.phpinfo.php
Summary
awiki is prone to multiple local le include (LFI) vulnerabilities because it fails to properly
sanitize user-supplied input.
Impact
An attacker can exploit this vulnerability to obtain potentially sensitive information and execute
arbitrary local scripts in the context of the webserver process. This may allow the attacker to
compromise the application and the host.
Solution:
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
Aected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 84
References
url: https://www.exploit-db.com/exploits/36047/
url: http://www.securityfocus.com/bid/49187
Summary
The remote host is running QWikiwiki, a Wiki application written in PHP.
The remote version of this software contains a validation input aw which may allow an attacker
to use it to read arbitrary les on the remote host with the privileges of the web server.
Solution:
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
References
cve: CVE-2005-0283
url: http://www.securityfocus.com/bid/12163
2 RESULTS PER HOST 85
Summary
The /doc directory is browsable. /doc shows the content of the /usr/doc directory and therefore
it shows which programs and - important! - the version of the installed programs.
Solution:
Solution type: Mitigation
Use access restrictions for the /doc directory. If you use Apache you might use this in your
access.conf:
<Directory /usr/doc> AllowOverride None order deny, allow deny from all allow from localhost
</Directory>
References
cve: CVE-1999-0678
url: http://www.securityfocus.com/bid/318
Summary
The host / application transmits sensitive information (username, passwords) in cleartext via
HTTP.
Impact
An attacker could use this situation to compromise or eavesdrop on the HTTP communication
between the client and the server using a man-in-the-middle attack to get access to sensitive data
like usernames or passwords.
Solution:
Solution type: Workaround
Enforce the transmission of sensitive data via an encrypted SSL/TLS connection. Additionally
make sure the host / application is redirecting all users to the secured SSL/TLS connection
before allowing to input sensitive data into the mentioned functions.
Aected Software/OS
Hosts / applications which doesn't enforce the transmission of sensitive data via an encrypted
SSL/TLS connection.
References
url: https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Se
,→ssion_Management
url: https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure
url: https://cwe.mitre.org/data/definitions/319.html
Summary
jQuery is prone to a cross-site scripting (XSS) vulnerability.
Solution:
Solution type: VendorFix
Update to version 1.6.3 or later.
Aected Software/OS
jQuery prior to version 1.6.3.
Vulnerability Insight
Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select
elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.
References
cve: CVE-2011-4969
url: https://blog.jquery.com/2011/09/01/jquery-1-6-3-released/
cert-bund: CB-K17/0195
dfn-cert: DFN-CERT-2017-0199
dfn-cert: DFN-CERT-2016-0890
Summary
Apache HTTP Server is prone to a cookie information disclosure vulnerability.
Impact
Successful exploitation will allow attackers to obtain sensitive information that may aid in further
attacks.
Solution:
Solution type: VendorFix
Update to Apache HTTP Server version 2.2.22 or later.
Aected Software/OS
Apache HTTP Server versions 2.2.0 through 2.2.21.
Vulnerability Insight
The aw is due to an error within the default error response for status code 400 when no custom
ErrorDocument is congured, which can be exploited to expose 'httpOnly' cookies.
References
cve: CVE-2012-0053
url: http://secunia.com/advisories/47779
url: http://www.securityfocus.com/bid/51706
url: http://www.exploit-db.com/exploits/18442
url: http://rhn.redhat.com/errata/RHSA-2012-0128.html
url: http://httpd.apache.org/security/vulnerabilities_22.html
url: http://svn.apache.org/viewvc?view=revision&revision=1235454
url: http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html
cert-bund: CB-K15/0080
cert-bund: CB-K14/1505
cert-bund: CB-K14/0608
dfn-cert: DFN-CERT-2015-0082
dfn-cert: DFN-CERT-2014-1592
dfn-cert: DFN-CERT-2014-0635
. . . continues on next page . . .
2 RESULTS PER HOST 89
Summary
phpMyAdmin is prone to a cross-site scripting (XSS) vulnerability.
Impact
Successful exploitation will allow attackers to inject arbitrary HTML code within the error page
and conduct phishing attacks.
Solution:
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
Aected Software/OS
phpMyAdmin version 3.3.8.1 and prior.
Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 90
References
cve: CVE-2010-4480
url: http://www.exploit-db.com/exploits/15699/
url: http://www.vupen.com/english/advisories/2010/3133
dfn-cert: DFN-CERT-2011-0467
dfn-cert: DFN-CERT-2011-0451
dfn-cert: DFN-CERT-2011-0016
dfn-cert: DFN-CERT-2011-0002
[ return to 10.0.0.11 ]
Summary
The remote host implements TCP timestamps and therefore allows to compute the uptime.
Impact
A side eect of this feature is that the uptime of the remote host can sometimes be computed.
Solution:
Solution type: Mitigation
To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to
/etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at runtime.
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
. . . continues on next page . . .
2 RESULTS PER HOST 91
Aected Software/OS
TCP implementations that implement RFC1323/RFC7323.
Vulnerability Insight
The remote host implements TCP timestamps, as dened by RFC1323/RFC7323.
References
url: https://datatracker.ietf.org/doc/html/rfc1323
url: https://datatracker.ietf.org/doc/html/rfc7323
url: https://web.archive.org/web/20151213072445/http://www.microsoft.com/en-us/d
,→ownload/details.aspx?id=9152
url: https://www.fortiguard.com/psirt/FG-IR-16-090
[ return to 10.0.0.11 ]
Summary
The remote SSH server is congured to allow / support weak MAC algorithm(s).
Solution:
Solution type: Mitigation
Disable the reported weak MAC algorithm(s).
References
url: https://www.rfc-editor.org/rfc/rfc6668
url: https://www.rfc-editor.org/rfc/rfc4253#section-6.4
[ return to 10.0.0.11 ]
NVT: SSL/TLS: SSLv3 Protocol CBC Cipher Suites Information Disclosure Vulnerability (POO-
DLE)
Summary
This host is prone to an information disclosure vulnerability.
Impact
Successful exploitation will allow a man-in-the-middle attackers gain access to the plain text data
stream.
Solution:
Solution type: Mitigation
Possible Mitigations are:
- Disable SSLv3
- Disable cipher suites supporting CBC cipher modes
- Enable TLS_FALLBACK_SCSV if the service is providing TLSv1.0+
Vulnerability Insight
The aw is due to the block cipher padding not being deterministic and not covered by the
Message Authentication Code
References
cve: CVE-2014-3566
url: https://www.openssl.org/~bodo/ssl-poodle.pdf
url: http://www.securityfocus.com/bid/70574
url: https://www.imperialviolet.org/2014/10/14/poodle.html
url: https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
url: http://googleonlinesecurity.blogspot.in/2014/10/this-poodle-bites-exploitin
,→g-ssl-30.html
cert-bund: WID-SEC-2023-0431
cert-bund: CB-K17/1198
cert-bund: CB-K17/1196
cert-bund: CB-K16/1828
cert-bund: CB-K16/1438
cert-bund: CB-K16/1384
cert-bund: CB-K16/1102
cert-bund: CB-K16/0599
cert-bund: CB-K16/0156
cert-bund: CB-K15/1514
cert-bund: CB-K15/1358
cert-bund: CB-K15/1021
cert-bund: CB-K15/0972
cert-bund: CB-K15/0637
cert-bund: CB-K15/0590
cert-bund: CB-K15/0525
cert-bund: CB-K15/0393
cert-bund: CB-K15/0384
cert-bund: CB-K15/0287
cert-bund: CB-K15/0252
cert-bund: CB-K15/0246
cert-bund: CB-K15/0237
cert-bund: CB-K15/0118
cert-bund: CB-K15/0110
cert-bund: CB-K15/0108
cert-bund: CB-K15/0080
cert-bund: CB-K15/0078
cert-bund: CB-K15/0077
cert-bund: CB-K15/0075
cert-bund: CB-K14/1617
cert-bund: CB-K14/1581
cert-bund: CB-K14/1537
cert-bund: CB-K14/1479
cert-bund: CB-K14/1458
cert-bund: CB-K14/1342
cert-bund: CB-K14/1314
cert-bund: CB-K14/1313
cert-bund: CB-K14/1311
. . . continues on next page . . .
2 RESULTS PER HOST 95
[ return to 10.0.0.11 ]
Impact
This information could theoretically be used to exploit weak time-based random number gener-
ators in other services.
Solution:
Solution type: Mitigation
Various mitigations are possible:
- Disable the support for ICMP timestamp on the remote host completely
- Protect the remote host by a rewall, and block ICMP packets passing through the rewall in
either direction (either completely or only for untrusted networks)
Vulnerability Insight
The Timestamp Reply is an ICMP message which replies to a Timestamp message. It consists
of the originating timestamp sent by the sender of the Timestamp as well as a receive timestamp
and a transmit timestamp.
References
cve: CVE-1999-0524
url: https://datatracker.ietf.org/doc/html/rfc792
url: https://datatracker.ietf.org/doc/html/rfc2780
cert-bund: CB-K15/1514
cert-bund: CB-K14/0632
dfn-cert: DFN-CERT-2014-0658
[ return to 10.0.0.11 ]
NVT: SSL/TLS: 'DHE_EXPORT' Man in the Middle Security Bypass Vulnerability (LogJam)
Summary
This host is accepting 'DHE_EXPORT' cipher suites and is prone to man in the middle attack.
Impact
Successful exploitation will allow a man-in-the-middle attacker to downgrade the security of a
TLS session to 512-bit export-grade cryptography, which is signicantly weaker, allowing the
attacker to more easily break the encryption and monitor or tamper with the encrypted stream.
Solution:
Solution type: VendorFix
- Remove support for 'DHE_EXPORT' cipher suites from the service
- If running OpenSSL updateto version 1.0.2b or 1.0.1n or later.
Aected Software/OS
- Hosts accepting 'DHE_EXPORT' cipher suites
- OpenSSL version before 1.0.2b and 1.0.1n
Vulnerability Insight
Flaw is triggered when handling Die-Hellman key exchanges dened in the 'DHE_EXPORT'
cipher suites.
References
cve: CVE-2015-4000
url: https://weakdh.org
url: http://www.securityfocus.com/bid/74733
url: https://weakdh.org/imperfect-forward-secrecy.pdf
url: http://openwall.com/lists/oss-security/2015/05/20/8
url: https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained
url: https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes
cert-bund: CB-K21/0067
cert-bund: CB-K19/0812
cert-bund: CB-K16/1593
cert-bund: CB-K16/1552
cert-bund: CB-K16/0617
cert-bund: CB-K16/0599
cert-bund: CB-K16/0168
cert-bund: CB-K16/0121
cert-bund: CB-K16/0090
cert-bund: CB-K16/0030
cert-bund: CB-K15/1591
cert-bund: CB-K15/1550
cert-bund: CB-K15/1517
cert-bund: CB-K15/1464
cert-bund: CB-K15/1442
cert-bund: CB-K15/1334
cert-bund: CB-K15/1269
cert-bund: CB-K15/1136
cert-bund: CB-K15/1090
cert-bund: CB-K15/1059
cert-bund: CB-K15/1022
cert-bund: CB-K15/1015
cert-bund: CB-K15/0964
cert-bund: CB-K15/0932
cert-bund: CB-K15/0927
cert-bund: CB-K15/0926
cert-bund: CB-K15/0907
cert-bund: CB-K15/0901
cert-bund: CB-K15/0896
cert-bund: CB-K15/0877
. . . continues on next page . . .
2 RESULTS PER HOST 99
NVT: SSL/TLS: SSLv3 Protocol CBC Cipher Suites Information Disclosure Vulnerability (POO-
DLE)
Summary
This host is prone to an information disclosure vulnerability.
Impact
Successful exploitation will allow a man-in-the-middle attackers gain access to the plain text data
stream.
Solution:
Solution type: Mitigation
Possible Mitigations are:
- Disable SSLv3
- Disable cipher suites supporting CBC cipher modes
- Enable TLS_FALLBACK_SCSV if the service is providing TLSv1.0+
Vulnerability Insight
The aw is due to the block cipher padding not being deterministic and not covered by the
Message Authentication Code
References
cve: CVE-2014-3566
url: https://www.openssl.org/~bodo/ssl-poodle.pdf
url: http://www.securityfocus.com/bid/70574
url: https://www.imperialviolet.org/2014/10/14/poodle.html
url: https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
. . . continues on next page . . .
2 RESULTS PER HOST 101
[ return to 10.0.0.11 ]