Groups and Contacts | |||
---|---|---|---|
Region | US | Business | janebloggs@yourcompany.com |
Platform | Unix |
Scan Information | |
---|---|
Scan Type | Enterprise |
Started at | 13-Apr-15 11:54 |
Finished at | 13-Apr-15 12:54 |
Port | Protocol | Service | Details | ||
---|---|---|---|---|---|
7 | tcp | echo | pingtest | ||
13 | tcp | daytime | 13 APR 2015 11:55:06 BST | ||
19 | tcp | chargen | )*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQR | ||
20 | tcp | ftp | 220 ProFTPD 1.2.1 Server [192.168.0.101] | ||
25 | tcp | smtp | 220 unhardened.example.com ESMTP Sendmail 8.12.8/8.12.8; Sat, 13 Apr 2015 11:54:20 +0100 | ||
80 | tcp | http | Apache/1.3.26 (Unix) (Technologue/Linux) mod_ssl/2.8.10 OpenSSL/0.9.6 PHP/4.0.6 | ||
111 | tcp | sunrpc | 9 services found | ||
7 | udp | echo | pingtest | ||
13 | udp | daytime | 13 APR 2015 11:55:06 BST | ||
19 | udp | chargen | ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh | ||
111 | udp | portmap | 9 services found | ||
123 | udp | ntp | system="Linux2.4.18-27.7.x", statum=2 |
Vulnerability | 90027 | High Risk Ports Open | High Risk |
---|
Description | The following high risk ports are open: PORT SERVICE 111/udp portmap 111/tcp sunrpc Note: Even if the ports are immediately closed after being opened, this is still a security risk as packets are reaching the destination host. It is recommended to completely drop packets from untrusted sources instead. |
||||
---|---|---|---|---|---|
Solution | Ensure that the ports are filtered by your router or firewall or close the ports on the affected systems. | ||||
Category | Hosting or infrastructure flaw. | ||||
CVE Reference | CVE-MAP-NOMATCH | CVSS2 6.4 (Medium) (AV:N/AC:L/Au:N/C:P/I:P/A:N) | |||
First Found | 13 April 2015 | Port | general | Last 6 Assessments |
Vulnerability | 10884 | NTP Information Leakage | Low Risk |
---|
Description | This system is running an NTP server that responds to information requests. An attacker could use this to extract information about the system, e.g. operating system, upstream NTP server and detailed clock information. | ||||
---|---|---|---|---|---|
Solution | Configure ntpd to ignore information requests. Alternatively, use a firewall to restrict NTP to trusted addresses. | ||||
Category | Hosting or infrastructure flaw. | ||||
CVE Reference | CVE-MAP-NOMATCH | CVSS2 5.0 (Medium) (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
First Found | 13 April 2015 | Port | 123/udp | Last 6 Assessments |