Uploaded by Sam Must

Nexpose CPS scan report

advertisement
Audit Report
cps site 1
Audited on November 20, 2021
Reported on November 20, 2021
Audit Report
1. Executive Summary
This report represents a security audit performed by Nexpose from Rapid7 LLC. It contains confidential information about the state of
your network. Access to this information by unauthorized personnel may allow them to compromise your network.
Site Name
Start Time
End Time
Total Time
Status
CPS site
November 20, 2021
00:49, PKT
November 20, 2021
01:16, PKT
26 minutes
Success
There is not enough historical data to display overall asset trend.
The audit was performed on 102 systems, 102 of which were found to be active and were scanned.
There were 324 vulnerabilities found during this scan. Of these, 37 were critical vulnerabilities. Critical vulnerabilities require immediate
attention. They are relatively easy for attackers to exploit and may provide them with full control of the affected systems. 126
vulnerabilities were severe. Severe vulnerabilities are often harder to exploit and may not provide the same access to affected systems.
There were 161 moderate vulnerabilities discovered. These often provide information to attackers that may assist them in mounting
subsequent attacks on your network. These should also be fixed in a timely manner, but are not as urgent as the other vulnerabilities.
Critical vulnerabilities were found to exist on 3 of the systems, making them most susceptible to attack. 31 systems were found to have
severe vulnerabilities. Moderate vulnerabilities were found on 101 systems. No vulnerabilities were found on the remaining 1 systems.
There were 87 occurrences of the generic-icmp-timestamp vulnerability, making it the most common vulnerability. There were 235
vulnerability instances in the Network category, making it the most common vulnerability category.
Page 1
Audit Report
The certificate-common-name-mismatch vulnerability poses the highest risk to the organization with a risk score of 12,415. Risk scores
are based on the types and numbers of vulnerabilities on affected assets.
There were 4 operating systems identified during this scan.
The Linux operating system was found on 97 systems, making it the most common operating system.
There were 25 services found to be running during this scan.
The SSH service was found on 98 systems, making it the most common service. The HTTPS service was found to have the most
vulnerabilities during this scan with 91 vulnerabilities.
Page 2
Audit Report
2. Discovered Systems
Node
Operating System
Risk
10.220.251.116
Unknown
25,643
10.220.251.46
Microsoft Windows
9,267
Aliases
•mfs-lhr-backup.mobilink.net.pk
•MFS-LHR-BACKUP
10.220.251.119
Microsoft Windows Server 2008
R2, Standard Edition
7,425
10.220.251.64
Linux LINUX 2.6.32
4,516
10.220.251.65
Linux LINUX 2.6.32
4,516
10.220.251.28
Linux LINUX 2.6.32
3,480
10.220.251.24
Linux LINUX 2.6.32
3,480
10.220.251.30
Linux LINUX 2.6.32
3,480
10.220.251.31
Linux LINUX 2.6.32
3,480
10.220.251.26
Linux LINUX 2.6.32
3,480
10.220.251.25
Linux LINUX 2.6.32
3,480
10.220.251.29
Linux LINUX 2.6.32
3,480
10.220.251.27
Linux LINUX 2.6.32
3,480
10.220.251.32
Linux LINUX 2.6.32
3,480
10.220.251.47
Cisco PIX 8.2
3,448
10.220.251.83
Linux LINUX 2.6.32
3,079
10.220.251.84
Linux LINUX 2.6.32
3,079
10.220.251.82
Linux LINUX 2.6.32
3,079
10.220.251.36
Linux 4.4.21-69-default
1,734
10.220.251.59
Linux LINUX 2.6.32
1,087
10.220.251.72
Linux LINUX 2.6.32
1,087
10.220.251.58
Linux LINUX 2.6.32
1,087
10.220.251.60
Linux LINUX 2.6.32
1,087
10.220.251.57
Linux LINUX 2.6.32
1,087
10.220.251.54
Linux LINUX 2.6.11 - 2.6.18
2.6.11
1,044
10.220.251.49
Linux LINUX 2.6.32
1,044
10.220.251.48
Linux LINUX 2.6.32
1,044
10.220.251.52
Linux LINUX 2.6.32
1,044
•WIN-MDJKT3PE7IL
Page 3
Audit Report
Node
Operating System
Risk
10.220.251.51
Linux LINUX 2.6.32
1,044
10.220.251.53
Linux LINUX 2.6.32
581
10.220.251.56
Linux LINUX 2.6.32
581
10.220.251.50
Linux LINUX 2.6.32
581
10.220.251.23
Linux LINUX 2.6.32
506
10.220.251.21
Linux LINUX 2.6.32
506
10.220.251.45
Linux LINUX 2.6.32
506
10.220.251.67
Linux LINUX 2.6.32
506
10.220.251.34
Linux LINUX 2.6.32
506
10.220.251.41
Linux LINUX 2.6.32
506
10.220.251.22
Linux LINUX 2.6.32
506
10.220.251.38
Linux LINUX 2.6.32
506
10.220.251.33
Linux LINUX 2.6.32
506
10.220.251.35
Linux LINUX 2.6.32
506
10.220.251.37
Linux LINUX 2.6.32
506
10.220.251.118
Linux LINUX 2.6.32
506
10.220.251.91
Linux LINUX 2.6.32
0.0
10.220.251.87
Linux LINUX 2.6.11 - 2.6.18
2.6.11
0.0
10.220.251.106
Linux LINUX 2.6.32
0.0
10.220.251.63
Linux LINUX 2.6.32
0.0
10.220.251.92
Linux LINUX 2.6.32
0.0
10.220.251.103
Linux LINUX 2.6.32
0.0
10.220.251.100
Linux LINUX 2.6.32
0.0
10.220.251.121
Linux LINUX 2.6.32
0.0
10.220.251.108
Linux LINUX 2.6.32
0.0
10.220.251.94
Linux LINUX 2.6.32
0.0
10.220.251.105
Linux LINUX 2.6.11 - 2.6.18
2.6.11
0.0
10.220.251.101
Linux LINUX 2.6.11 - 2.6.18
2.6.11
0.0
10.220.251.107
Linux LINUX 2.6.11 - 2.6.18
2.6.11
0.0
10.220.251.102
Linux LINUX 2.6.32
0.0
Aliases
Page 4
Audit Report
Node
Operating System
Risk
10.220.251.112
Linux LINUX 2.6.32
0.0
10.220.251.109
Linux LINUX 2.6.32
0.0
10.220.251.104
Linux LINUX 2.6.32
0.0
10.220.251.11
Linux LINUX 2.6.32
0.0
10.220.251.110
Linux LINUX 2.6.32
0.0
10.220.251.62
Linux LINUX 2.6.32
0.0
10.220.251.13
Linux LINUX 2.6.32
0.0
10.220.251.7
Linux LINUX 2.6.32
0.0
10.220.251.16
Linux LINUX 2.6.32
0.0
10.220.251.99
Linux LINUX 2.6.32
0.0
10.220.251.98
Linux LINUX 2.6.32
0.0
10.220.251.97
Linux LINUX 2.6.32
0.0
10.220.251.96
Linux LINUX 2.6.11 - 2.6.18
2.6.11
0.0
10.220.251.77
Linux LINUX 2.6.32
0.0
10.220.251.79
Linux LINUX 2.6.32
0.0
10.220.251.78
Linux LINUX 2.6.32
0.0
10.220.251.39
Linux LINUX 2.6.11 - 2.6.18
2.6.11
0.0
10.220.251.81
Linux LINUX 2.6.32
0.0
10.220.251.76
Linux LINUX 2.6.32
0.0
10.220.251.68
Linux LINUX 2.6.32
0.0
10.220.251.69
Linux LINUX 2.6.32
0.0
10.220.251.90
Linux LINUX 2.6.11 - 2.6.18
2.6.11
0.0
10.220.251.93
Linux LINUX 2.6.32
0.0
10.220.251.20
Linux LINUX 2.6.32
0.0
10.220.251.66
Linux LINUX 2.6.32
0.0
10.220.251.113
Linux LINUX 2.6.32
0.0
10.220.251.117
Linux LINUX 2.6.32
0.0
10.220.251.115
Linux LINUX 2.6.32
0.0
10.220.251.61
Linux LINUX 2.6.32
0.0
10.220.251.111
Linux LINUX 2.6.32
0.0
10.220.251.122
Linux LINUX 2.6.11 - 2.6.18
0.0
Aliases
Page 5
Audit Report
Node
Operating System
Risk
Aliases
2.6.11
10.220.251.114
Unknown
0.0
10.220.251.88
Linux LINUX 2.6.32
0.0
10.220.251.89
Linux LINUX 2.6.32
0.0
10.220.251.12
Linux LINUX 2.6.32
0.0
10.220.251.14
Linux LINUX 2.6.32
0.0
10.220.251.8
Linux LINUX 2.6.32
0.0
10.220.251.10
Linux LINUX 2.6.32
0.0
10.220.251.17
Linux LINUX 2.6.32
0.0
10.220.251.18
Linux LINUX 2.6.32
0.0
10.220.251.80
Linux LINUX 2.6.32
0.0
10.220.251.9
Linux LINUX 2.6.11 - 2.6.18
2.6.11
0.0
10.220.251.15
Linux LINUX 2.6.11 - 2.6.18
2.6.11
0.0
10.220.251.95
Linux LINUX 2.6.32
0.0
Page 6
Audit Report
3. Discovered and Potential Vulnerabilities
3.1. Critical Vulnerabilities
3.1.1. Default or Guessable SNMP community names: public (snmp-read-0001)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"public" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[public] realm[]
10.220.251.46:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[public] realm[]
References:
Source
Reference
BID
2896
BID
3795
BID
3797
CVE
CVE-1999-0186
CVE
CVE-1999-0254
CVE
CVE-1999-0472
CVE
CVE-1999-0516
CVE
CVE-1999-0517
CVE
CVE-2001-0514
CVE
CVE-2002-0109
CVE
CVE-2010-1574
Page 7
Audit Report
Source
Reference
XF
6576
XF
7827
Vulnerability Solution:
•Secure the SNMP installation
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
•Secure the SNMP installation on Cisco IOS
1. For SNMP Servers running on Cisco IOS, a Cisco IOS Software upgrade should be performed as a permanent fix for this
vulnerability.
2. Alternatively, create an Embedded Event Manager policy to remove the hard-coded SNMP community names using the following
steps:
3. event manager applet cisco-sa-20100707-snmp
4.
event timer countdown time 30
5.
action 10 cli command "enable"
6.
action 20 cli command "configure terminal"
7.
action 30 cli command "no snmp-server community public RO"
8.
action 40 cli command "no snmp-server community private RW"
9.
action 50 cli command "end"
10. action 60 cli command "disable"
11. action 70 syslog msg "Hard-coded SNMP community names as per Cisco Security Advisory cisco-sa-20100707-snmp removed"
https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-20100707-snmp.html
3.1.2. Default or Guessable SNMP community names: private (snmp-read-0002)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"private" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
This string is a known default community string on SCO Open Server 5.0.5. If you use this system, please see the specific solution
below.
Page 8
Audit Report
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[private] realm[]
References:
Source
Reference
BID
973
CVE
CVE-1999-0516
CVE
CVE-1999-0517
CVE
CVE-2000-0147
CVE
CVE-2010-1574
URL
ftp://ftp.sco.com/SSE/security_bulletins/SB-00.04a
URL
http://archives.neohapsis.com/archives/bugtraq/2000-02/0045.html
Vulnerability Solution:
•Fix Default or Guessable SNMP community names: private
The following steps are recommended for dealing with this vulnerability:
1. If you do not absolutely need SNMP, disable it. SNMP version 1 is inherently insecure. SNMP version 3 provides more complex
authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
To remove this vulnerability on SCO Open Server 5.0.5:
1. Edit /etc/snmpd.comm
2. Remove the 'private' string from the list of communities
3. Restart the snmpd process
•Secure the SNMP installation on Cisco IOS
1. For SNMP Servers running on Cisco IOS, a Cisco IOS Software upgrade should be performed as a permanent fix for this
vulnerability.
2. Alternatively, create an Embedded Event Manager policy to remove the hard-coded SNMP community names using the following
steps:
3. event manager applet cisco-sa-20100707-snmp
4.
event timer countdown time 30
5.
action 10 cli command "enable"
6.
action 20 cli command "configure terminal"
Page 9
Audit Report
7.
action 30 cli command "no snmp-server community public RO"
8.
action 40 cli command "no snmp-server community private RW"
9.
action 50 cli command "end"
10. action 60 cli command "disable"
11. action 70 syslog msg "Hard-coded SNMP community names as per Cisco Security Advisory cisco-sa-20100707-snmp removed"
https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-20100707-snmp.html
3.1.3. Default or Guessable SNMP community names: snmpd (snmp-read-0018)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"snmpd" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
The community string "snmpd" may also imply a more serious vulnerability on HP OpenView SNMP servers. This may be a hidden
community string. This community allows unauthorized access to certain SNMP variables. Attackers can use this community to
discover network topology and modify MIB variables. HP OpenView Version 5.02 is vulnerable. Earlier versions are thought to be
vulnerable as well. HP-UX 9.X and HP-UX 10.X SNMP agents are vulnerable if OpenView is installed. OpenView for Solaris 2.X is also
vulnerable. OpenView for Windows NT is not vulnerable.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[snmpd] realm[]
References:
Source
Reference
CVE
CVE-1999-0254
CVE
CVE-1999-0516
CVE
CVE-1999-0517
URL
http://xforce.iss.net/alerts/vol-3_num-2.phpHPOV-hidden-SNMP-comm
Vulnerability Solution:
The following steps are recommended for dealing with this vulnerability:
Page 10
Audit Report
1. If you do not absolutely need SNMP, disable it. SNMP version 1 is inherently insecure. SNMP version 3 provides more complex
authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
HP has made the following patches available for OpenView:
PHSS_16800:HP-UX Version 10.X
PHSS_16799:HP-UX Version 9.X
PHOV_02190:Solaris Version 2.X
3.1.4. Default or Guessable SNMP community names: all private (snmp-read-0021)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"all private" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
The community name "all private" may also indicate a more serious vulnerability if you are running Solstice Enterprise Agents(SEA) on
Solaris.
From bugtraq: The Solstice Enterprise Agents (SEA) enables the creation of custom, extensible agents for device and system
management for Solaris. SEA supports both the Simple Network Management Protocol (SNMP) and DMI protocols.
A default community string is present in the Sun SNMP subagent that may be remotely exploited by an unauthorized user to modify
system parameters or execute arbitrary commands with root privileges.
SEA was initially available as an unbundled product and later bundled with Solaris 2.6 at version 1.0.1.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[all private] realm[]
References:
Source
Reference
Page 11
Audit Report
Source
Reference
CVE
CVE-1999-0186
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
Download and apply the upgrade from: http://www.sun.com/solstice/products/ent.agents/
If you are running SEA on the vulnerable machine these are the recommended steps:
Sites running Solaris 2.6 and SEA on Solaris 2.5.1 should upgrade the SEA software to SEA 1.03. SEA 1.0.3 is bundled with Solaris 7.
SEA 1.0.3 is available for Solaris 2.6, 2.6_x86, 2.5.1, and 2.5.1_x86 and may be downloaded from:
http://www.sun.com/solstice/products/ent.agents/ ( http://www.sun.com/solstice/products/ent.agents/ )
Sites running SEA 1.0 on Solaris 2.4 and 2.5 should either disable SEA or upgrade the operating system to Solaris 7 if possible. Sites
upgrading to Solaris 2.5.1 or 2.6 may obtain SEA 1.0.3 from the URL listed above.
Workaround:
To determine if your system is using SEA, use pkginfo on one of the following SEA packages: SUNWmibii, SUNWsacom, SUNWsadmi,
SUNWsasnm.
On SEA 1.0 and 1.0.1, a pkginfo on SUNWmibii will display as follows:
% pkginfo SUNWmibii
system SUNWmibii Solstice Enterprise Agent SNMP daemon
On SEA 1.0.2:
% pkginfo SUNWmibii
system SUNWmibii Solstice Enterprise Agents 1.0.2 SNMP daemon
To disable SEA, perform the following steps:
% su
Password:
# /etc/init.d/init.snmpdx stop
# mv /etc/rc3.d/S76snmpdx /etc/rc3.d/DISABLED_S76snmpdx
Sun Solaris 2.4_x86:
Sun Solaris 2.4:
Sun Solaris 2.5_x86:
Sun Solaris 2.5.1_x86:
Sun Solaris 2.5.1:
Sun Solaris 2.6_x86:
Sun Patch 106600-02
Sun Solaris 2.6:
Sun Patch 106037-05
Page 12
Audit Report
In adition, the following steps are recommended for dealing with this vulnerability:
1. If you do not absolutely need SNMP, disable it. SNMP version 1 is inherently insecure. SNMP version 3 provides more complex
authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.5. Microsoft CVE-2017-0146: Windows SMB Remote Code Execution Vulnerability (msft-cve-2017-0146)
Description:
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain
requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. To exploit
the vulnerability, in most situations, an authenticated attacker could send a specially crafted packet to a targeted SMBv1 server. The
security update addresses the vulnerability by correcting how SMBv1 handles these specially crafted requests.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119
Host returned expected exception that indicates vulnerability
(INSUFF_SERVER_RESOURCES).
References:
Source
Reference
CVE
CVE-2017-0146
MSKB
4012212
MSKB
4012213
MSKB
4012214
MSKB
4012215
MSKB
4012216
MSKB
4012217
MSKB
4012598
MSKB
4012606
MSKB
4013198
MSKB
4013429
MS
MS17-006
MS
MS17-008
MS
MS17-010
Page 13
Audit Report
Vulnerability Solution:
•Microsoft Windows Embedded Standard 7 SP1 (x86)
March, 2017 Security Only Quality Update for Windows Embedded Standard 7 (KB4012212)
Download and apply the patch from: http://support.microsoft.com/kb/4012212
•Microsoft Windows Server 2008 R2 SP1 (ia64), Microsoft Windows Server 2008 R2, Enterprise Edition SP1 (ia64), Microsoft Windows
Server 2008 R2, Standard Edition SP1 (ia64), Microsoft Windows Server 2008 R2, Datacenter Edition SP1 (ia64), Microsoft Windows
Server 2008 R2, Web Edition SP1 (ia64)
March, 2017 Security Only Quality Update for Windows Server 2008 R2 for Itanium-based Systems (KB4012212)
Download and apply the patch from: http://support.microsoft.com/kb/4012212
•Microsoft Windows 7 SP1 (x86_64), Microsoft Windows 7 Home, Basic Edition SP1 (x86_64), Microsoft Windows 7 Home, Basic N
Edition SP1 (x86_64), Microsoft Windows 7 Home, Premium Edition SP1 (x86_64), Microsoft Windows 7 Home, Premium N Edition
SP1 (x86_64), Microsoft Windows 7 Ultimate Edition SP1 (x86_64), Microsoft Windows 7 Ultimate N Edition SP1 (x86_64), Microsoft
Windows 7 Enterprise Edition SP1 (x86_64), Microsoft Windows 7 Enterprise N Edition SP1 (x86_64), Microsoft Windows 7
Professional Edition SP1 (x86_64), Microsoft Windows 7 Starter Edition SP1 (x86_64), Microsoft Windows 7 Starter N Edition SP1
(x86_64)
March, 2017 Security Only Quality Update for Windows 7 for x64-based Systems (KB4012212)
Download and apply the patch from: http://support.microsoft.com/kb/4012212
•Microsoft Windows Server 2008 R2 SP1 (x86_64), Microsoft Windows Server 2008 R2, Enterprise Edition SP1 (x86_64), Microsoft
Windows Server 2008 R2, Standard Edition SP1 (x86_64), Microsoft Windows Server 2008 R2, Datacenter Edition SP1 (x86_64),
Microsoft Windows Server 2008 R2, Web Edition SP1 (x86_64)
March, 2017 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB4012212)
Download and apply the patch from: http://support.microsoft.com/kb/4012212
•Microsoft Windows Embedded Standard 7 SP1 (x86_64)
March, 2017 Security Only Quality Update for Windows Embedded Standard 7 for x64-based Systems (KB4012212)
Download and apply the patch from: http://support.microsoft.com/kb/4012212
•Microsoft Windows 7 SP1 (x86), Microsoft Windows 7 Home, Basic Edition SP1 (x86), Microsoft Windows 7 Home, Basic N Edition
SP1 (x86), Microsoft Windows 7 Home, Premium Edition SP1 (x86), Microsoft Windows 7 Home, Premium N Edition SP1 (x86),
Microsoft Windows 7 Ultimate Edition SP1 (x86), Microsoft Windows 7 Ultimate N Edition SP1 (x86), Microsoft Windows 7 Enterprise
Edition SP1 (x86), Microsoft Windows 7 Enterprise N Edition SP1 (x86), Microsoft Windows 7 Professional Edition SP1 (x86),
Microsoft Windows 7 Starter Edition SP1 (x86), Microsoft Windows 7 Starter N Edition SP1 (x86)
March, 2017 Security Only Quality Update for Windows 7 (KB4012212)
Download and apply the patch from: http://support.microsoft.com/kb/4012212
•Microsoft Windows 8.1 (x86_64), Microsoft Windows 8.1 Enterprise Edition (x86_64), Microsoft Windows 8.1 Professional Edition
(x86_64)
March, 2017 Security Only Quality Update for Windows 8.1 for x64-based Systems (KB4012213)
Download and apply the patch from: http://support.microsoft.com/kb/4012213
•Microsoft Windows 8.1 (x86), Microsoft Windows 8.1 Enterprise Edition (x86), Microsoft Windows 8.1 Professional Edition (x86)
March, 2017 Security Only Quality Update for Windows 8.1 (KB4012213)
Download and apply the patch from: http://support.microsoft.com/kb/4012213
•Microsoft Windows Server 2012 R2 (x86_64), Microsoft Windows Server 2012 R2 Essentials Edition (x86_64), Microsoft Windows
Server 2012 R2 Standard Edition (x86_64), Microsoft Windows Server 2012 R2 Datacenter Edition (x86_64), Microsoft Windows
Page 14
Audit Report
Server 2012 R2 Foundation Edition (x86_64), Microsoft Windows Storage Server 2012 R2 (x86_64)
March, 2017 Security Only Quality Update for Windows Server 2012 R2 (KB4012213)
Download and apply the patch from: http://support.microsoft.com/kb/4012213
•Microsoft Windows 8 Embedded (x86_64)
March, 2017 Security Only Quality Update for Windows Embedded 8 Standard for x64-based Systems (KB4012214)
Download and apply the patch from: http://support.microsoft.com/kb/4012214
•Microsoft Windows Server 2012 (x86_64), Microsoft Windows Server 2012 Essentials Edition (x86_64), Microsoft Windows Server
2012 Standard Edition (x86_64), Microsoft Windows Server 2012 Datacenter Edition (x86_64), Microsoft Windows Server 2012
Foundation Edition (x86_64), Microsoft Windows Storage Server 2012 (x86_64)
March, 2017 Security Only Quality Update for Windows Server 2012 (KB4012214)
Download and apply the patch from: http://support.microsoft.com/kb/4012214
•Microsoft Windows 8 Embedded (x86)
March, 2017 Security Only Quality Update for Windows Embedded 8 Standard (KB4012214)
Download and apply the patch from: http://support.microsoft.com/kb/4012214
•Microsoft Windows 8 (x86_64), Microsoft Windows 8 Enterprise Edition (x86_64), Microsoft Windows 8 Professional Edition (x86_64),
Microsoft Windows RT (x86_64)
Security Update for Windows 8 for x64-based Systems (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows Vista Home, Basic Edition SP2 (x86_64), Microsoft Windows Vista Home, Basic N Edition SP2 (x86_64), Microsoft
Windows Vista Home, Premium Edition SP2 (x86_64), Microsoft Windows Vista Ultimate Edition SP2 (x86_64), Microsoft Windows
Vista Enterprise Edition SP2 (x86_64), Microsoft Windows Vista Business Edition SP2 (x86_64), Microsoft Windows Vista Business N
Edition SP2 (x86_64), Microsoft Windows Vista Starter Edition SP2 (x86_64)
Security Update for Windows Vista for x64-based Systems (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows XP Professional SP3 (x86)
Security Update for WES09 and POSReady 2009 (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows Server 2008 SP2 (ia64), Microsoft Windows Server 2008 Enterprise Edition SP2 (ia64), Microsoft Windows Server
2008 Standard Edition SP2 (ia64), Microsoft Windows Server 2008 Datacenter Edition SP2 (ia64), Microsoft Windows Server 2008
HPC Edition SP2 (ia64), Microsoft Windows Server 2008 Web Edition SP2 (ia64), Microsoft Windows Server 2008 Storage Edition
SP2 (ia64), Microsoft Windows Small Business Server 2008 SP2 (ia64), Microsoft Windows Essential Business Server 2008 SP2
(ia64)
Security Update for Windows Server 2008 for Itanium-based Systems (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows Server 2008 SP2 (x86_64), Microsoft Windows Server 2008 Enterprise Edition SP2 (x86_64), Microsoft Windows
Server 2008 Standard Edition SP2 (x86_64), Microsoft Windows Server 2008 Datacenter Edition SP2 (x86_64), Microsoft Windows
Server 2008 HPC Edition SP2 (x86_64), Microsoft Windows Server 2008 Web Edition SP2 (x86_64), Microsoft Windows Server 2008
Storage Edition SP2 (x86_64), Microsoft Windows Small Business Server 2008 SP2 (x86_64), Microsoft Windows Essential Business
Server 2008 SP2 (x86_64)
Security Update for Windows Server 2008 for x64-based Systems (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
Page 15
Audit Report
•Microsoft Windows Vista Home, Basic Edition SP2 (x86), Microsoft Windows Vista Home, Basic N Edition SP2 (x86), Microsoft
Windows Vista Home, Premium Edition SP2 (x86), Microsoft Windows Vista Ultimate Edition SP2 (x86), Microsoft Windows Vista
Enterprise Edition SP2 (x86), Microsoft Windows Vista Business Edition SP2 (x86), Microsoft Windows Vista Business N Edition SP2
(x86), Microsoft Windows Vista Starter Edition SP2 (x86)
Security Update for Windows Vista (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows Server 2003 SP2 (x86_64), Microsoft Windows Server 2003, Standard Edition SP2 (x86_64), Microsoft Windows
Server 2003, Enterprise Edition SP2 (x86_64), Microsoft Windows Server 2003, Datacenter Edition SP2 (x86_64), Microsoft Windows
Server 2003, Web Edition SP2 (x86_64), Microsoft Windows Small Business Server 2003 SP2 (x86_64)
Security Update for Windows Server 2003 for x64-based Systems (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows Server 2008 SP2 (x86), Microsoft Windows Server 2008 Enterprise Edition SP2 (x86), Microsoft Windows Server
2008 Standard Edition SP2 (x86), Microsoft Windows Server 2008 Datacenter Edition SP2 (x86), Microsoft Windows Server 2008 HPC
Edition SP2 (x86), Microsoft Windows Server 2008 Web Edition SP2 (x86), Microsoft Windows Server 2008 Storage Edition SP2 (x86),
Microsoft Windows Small Business Server 2008 SP2 (x86), Microsoft Windows Essential Business Server 2008 SP2 (x86)
Security Update for Windows Server 2008 (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows XP Professional SP3 (x86), Microsoft Windows XP Home SP3 (x86), Microsoft Windows XP Media Center Edition
2005 SP3 (x86), Microsoft Windows XP Tablet PC Edition 2005 SP3 (x86)
Security Update for Windows XP SP3 (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows XP Professional SP2 (x86_64), Microsoft Windows XP Home SP2 (x86_64), Microsoft Windows XP Media Center
Edition SP2 (x86_64), Microsoft Windows XP Tablet PC Edition SP2 (x86_64)
Security Update for Windows XP SP2 for x64-based Systems (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows XP Professional SP3 (x86), Microsoft Windows XP Home SP3 (x86), Microsoft Windows XP Media Center Edition
2005 SP3 (x86), Microsoft Windows XP Tablet PC Edition 2005 SP3 (x86)
Security Update for Windows XP SP3 for XPe (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows 8 (x86), Microsoft Windows 8 Enterprise Edition (x86), Microsoft Windows 8 Professional Edition (x86), Microsoft
Windows RT (x86)
Security Update for Windows 8 (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows Server 2003 SP2 (x86), Microsoft Windows Server 2003, Standard Edition SP2 (x86), Microsoft Windows Server
2003, Enterprise Edition SP2 (x86), Microsoft Windows Server 2003, Datacenter Edition SP2 (x86), Microsoft Windows Server 2003,
Web Edition SP2 (x86), Microsoft Windows Small Business Server 2003 SP2 (x86)
Security Update for Windows Server 2003 (KB4012598)
Download and apply the patch from: http://support.microsoft.com/kb/4012598
•Microsoft Windows 10 (x86_64), Microsoft Windows 10 Education Edition (x86_64), Microsoft Windows 10 Enterprise Edition (x86_64),
Microsoft Windows 10 Home Edition (x86_64), Microsoft Windows 10 Mobile Enterprise Edition (x86_64), Microsoft Windows 10
Mobile Edition (x86_64), Microsoft Windows 10 Professional Edition (x86_64)
Page 16
Audit Report
Cumulative Update for Windows 10 for x64-based Systems (KB4012606)
Download and apply the patch from: http://support.microsoft.com/kb/4012606
•Microsoft Windows 10 (x86), Microsoft Windows 10 Education Edition (x86), Microsoft Windows 10 Enterprise Edition (x86), Microsoft
Windows 10 Home Edition (x86), Microsoft Windows 10 Mobile Enterprise Edition (x86), Microsoft Windows 10 Mobile Edition (x86),
Microsoft Windows 10 Professional Edition (x86)
Cumulative Update for Windows 10 (KB4012606)
Download and apply the patch from: http://support.microsoft.com/kb/4012606
•Microsoft Windows 10 1511 (x86_64), Microsoft Windows 10 Education Edition 1511 (x86_64), Microsoft Windows 10 Enterprise
Edition 1511 (x86_64), Microsoft Windows 10 Home Edition 1511 (x86_64), Microsoft Windows 10 Mobile Enterprise Edition 1511
(x86_64), Microsoft Windows 10 Mobile Edition 1511 (x86_64), Microsoft Windows 10 Professional Edition 1511 (x86_64)
Cumulative Update for Windows 10 Version 1511 for x64-based Systems (KB4013198)
Download and apply the patch from: http://support.microsoft.com/kb/4013198
•Microsoft Windows 10 1511 (x86), Microsoft Windows 10 Education Edition 1511 (x86), Microsoft Windows 10 Enterprise Edition 1511
(x86), Microsoft Windows 10 Home Edition 1511 (x86), Microsoft Windows 10 Mobile Enterprise Edition 1511 (x86), Microsoft
Windows 10 Mobile Edition 1511 (x86), Microsoft Windows 10 Professional Edition 1511 (x86)
Cumulative Update for Windows 10 Version 1511 (KB4013198)
Download and apply the patch from: http://support.microsoft.com/kb/4013198
•Microsoft Windows 10 1607 (x86), Microsoft Windows 10 Education Edition 1607 (x86), Microsoft Windows 10 Enterprise Edition 1607
(x86), Microsoft Windows 10 Home Edition 1607 (x86), Microsoft Windows 10 Mobile Enterprise Edition 1607 (x86), Microsoft
Windows 10 Mobile Edition 1607 (x86), Microsoft Windows 10 Professional Edition 1607 (x86)
Cumulative Update for Windows 10 Version 1607 (KB4013429)
Download and apply the patch from: http://support.microsoft.com/kb/4013429
•Microsoft Windows Server 2016 (x86_64), Microsoft Windows Server 2016 Essentials Edition (x86_64), Microsoft Windows Server
2016 Standard Edition (x86_64), Microsoft Windows Server 2016 Datacenter Edition (x86_64), Microsoft Windows Server 2016
MultiPoint Premium Edition (x86_64), Microsoft Windows Storage Server 2016 (x86_64)
Cumulative Update for Windows Server 2016 for x64-based Systems (KB4013429)
Download and apply the patch from: http://support.microsoft.com/kb/4013429
•Microsoft Windows 10 1607 (x86_64), Microsoft Windows 10 Education Edition 1607 (x86_64), Microsoft Windows 10 Enterprise
Edition 1607 (x86_64), Microsoft Windows 10 Home Edition 1607 (x86_64), Microsoft Windows 10 Mobile Enterprise Edition 1607
(x86_64), Microsoft Windows 10 Mobile Edition 1607 (x86_64), Microsoft Windows 10 Professional Edition 1607 (x86_64)
Cumulative Update for Windows 10 Version 1607 for x64-based Systems (KB4013429)
Download and apply the patch from: http://support.microsoft.com/kb/4013429
3.1.6. MS12-020: Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387) (windows-hotfixms12-020)
Description:
This security update resolves two privately reported vulnerabilities in the Remote Desktop Protocol. The more severe of these
vulnerabilities could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected
system. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. Systems that do not have
RDP enabled are not at risk.
Page 17
Audit Report
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:22
Running RDP serviceUser 1 was able to connect to the channel assigned to
User 2. Endpoint is vulnerable to MS12-020.
References:
Source
Reference
CERT
TA12-073A
CVE
CVE-2012-0002
CVE
CVE-2012-0152
DISA_SEVERITY
Category I
DISA_VMSKEY
V0031885
IAVM
2012-A-0039
MS
MS12-020
MSKB
2671387
OVAL
14623
OVAL
14626
Vulnerability Solution:
•Microsoft Windows Embedded Standard 7 SP1 (x86)
MS12-020: Security Update for Windows Embedded Standard 7 (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Vista SP2 (x86), Microsoft Windows Vista Home, Basic Edition SP2 (x86), Microsoft Windows Vista Home, Basic N
Edition SP2 (x86), Microsoft Windows Vista Home, Premium Edition SP2 (x86), Microsoft Windows Vista Ultimate Edition SP2 (x86),
Microsoft Windows Vista Enterprise Edition SP2 (x86), Microsoft Windows Vista Business Edition SP2 (x86), Microsoft Windows Vista
Business N Edition SP2 (x86), Microsoft Windows Vista Starter Edition SP2 (x86)
MS12-020: Security Update for Windows Vista (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows 7 SP1 (x86), Microsoft Windows 7 Home, Basic Edition SP1 (x86), Microsoft Windows 7 Home, Basic N Edition
SP1 (x86), Microsoft Windows 7 Home, Premium Edition SP1 (x86), Microsoft Windows 7 Home, Premium N Edition SP1 (x86),
Microsoft Windows 7 Ultimate Edition SP1 (x86), Microsoft Windows 7 Ultimate N Edition SP1 (x86), Microsoft Windows 7 Enterprise
Edition SP1 (x86), Microsoft Windows 7 Enterprise N Edition SP1 (x86), Microsoft Windows 7 Professional Edition SP1 (x86),
Microsoft Windows 7 Starter Edition SP1 (x86), Microsoft Windows 7 Starter N Edition SP1 (x86)
MS12-020: Security Update for Windows 7 (KB2667402)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Server 2008 SP2 (ia64), Microsoft Windows Server 2008 Enterprise Edition SP2 (ia64), Microsoft Windows Server
2008 Standard Edition SP2 (ia64), Microsoft Windows Server 2008 Datacenter Edition SP2 (ia64), Microsoft Windows Server 2008
Page 18
Audit Report
HPC Edition SP2 (ia64), Microsoft Windows Server 2008 Web Edition SP2 (ia64), Microsoft Windows Server 2008 Storage Edition
SP2 (ia64), Microsoft Windows Small Business Server 2008 SP2 (ia64), Microsoft Windows Essential Business Server 2008 SP2
(ia64)
MS12-020: Security Update for Windows Server 2008 for Itanium-based Systems (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Embedded Standard 7 SP1 (x86_64)
MS12-020: Security Update for Windows Embedded Standard 7 for x64-based Systems (KB2667402)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Server 2008 R2 SP1 OR < SP1 (x86_64), Microsoft Windows Server 2008 R2, Enterprise Edition SP1 OR < SP1
(x86_64), Microsoft Windows Server 2008 R2, Standard Edition SP1 OR < SP1 (x86_64), Microsoft Windows Server 2008 R2,
Datacenter Edition SP1 OR < SP1 (x86_64), Microsoft Windows Server 2008 R2, Web Edition SP1 OR < SP1 (x86_64)
MS12-020: Security Update for Windows Server 2008 R2 x64 Edition (KB2667402)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows 7 < SP1 (x86_64), Microsoft Windows 7 Home, Basic Edition < SP1 (x86_64), Microsoft Windows 7 Home, Basic N
Edition < SP1 (x86_64), Microsoft Windows 7 Home, Premium Edition < SP1 (x86_64), Microsoft Windows 7 Home, Premium N
Edition < SP1 (x86_64), Microsoft Windows 7 Ultimate Edition < SP1 (x86_64), Microsoft Windows 7 Ultimate N Edition < SP1
(x86_64), Microsoft Windows 7 Enterprise Edition < SP1 (x86_64), Microsoft Windows 7 Enterprise N Edition < SP1 (x86_64),
Microsoft Windows 7 Professional Edition < SP1 (x86_64), Microsoft Windows 7 Starter Edition < SP1 (x86_64), Microsoft Windows 7
Starter N Edition < SP1 (x86_64)
MS12-020: Security Update for Windows 7 SP0 for x64-based Systems (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows 7 < SP1 (x86), Microsoft Windows 7 Home, Basic Edition < SP1 (x86), Microsoft Windows 7 Home, Basic N Edition
< SP1 (x86), Microsoft Windows 7 Home, Premium Edition < SP1 (x86), Microsoft Windows 7 Home, Premium N Edition < SP1 (x86),
Microsoft Windows 7 Ultimate Edition < SP1 (x86), Microsoft Windows 7 Ultimate N Edition < SP1 (x86), Microsoft Windows 7
Enterprise Edition < SP1 (x86), Microsoft Windows 7 Enterprise N Edition < SP1 (x86), Microsoft Windows 7 Professional Edition <
SP1 (x86), Microsoft Windows 7 Starter Edition < SP1 (x86), Microsoft Windows 7 Starter N Edition < SP1 (x86)
MS12-020: Security Update for Windows 7 SP0 (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows 7 SP1 (x86_64), Microsoft Windows 7 Home, Basic Edition SP1 (x86_64), Microsoft Windows 7 Home, Basic N
Edition SP1 (x86_64), Microsoft Windows 7 Home, Premium Edition SP1 (x86_64), Microsoft Windows 7 Home, Premium N Edition
SP1 (x86_64), Microsoft Windows 7 Ultimate Edition SP1 (x86_64), Microsoft Windows 7 Ultimate N Edition SP1 (x86_64), Microsoft
Windows 7 Enterprise Edition SP1 (x86_64), Microsoft Windows 7 Enterprise N Edition SP1 (x86_64), Microsoft Windows 7
Professional Edition SP1 (x86_64), Microsoft Windows 7 Starter Edition SP1 (x86_64), Microsoft Windows 7 Starter N Edition SP1
(x86_64)
MS12-020: Security Update for Windows 7 for x64-based Systems (KB2667402)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows 7 < SP1 (x86_64), Microsoft Windows 7 Home, Basic Edition < SP1 (x86_64), Microsoft Windows 7 Home, Basic N
Edition < SP1 (x86_64), Microsoft Windows 7 Home, Premium Edition < SP1 (x86_64), Microsoft Windows 7 Home, Premium N
Edition < SP1 (x86_64), Microsoft Windows 7 Ultimate Edition < SP1 (x86_64), Microsoft Windows 7 Ultimate N Edition < SP1
(x86_64), Microsoft Windows 7 Enterprise Edition < SP1 (x86_64), Microsoft Windows 7 Enterprise N Edition < SP1 (x86_64),
Microsoft Windows 7 Professional Edition < SP1 (x86_64), Microsoft Windows 7 Starter Edition < SP1 (x86_64), Microsoft Windows 7
Page 19
Audit Report
Starter N Edition < SP1 (x86_64)
MS12-020: Security Update for Windows 7 SP0 for x64-based Systems (KB2667402)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows 7 < SP1 (x86), Microsoft Windows 7 Home, Basic Edition < SP1 (x86), Microsoft Windows 7 Home, Basic N Edition
< SP1 (x86), Microsoft Windows 7 Home, Premium Edition < SP1 (x86), Microsoft Windows 7 Home, Premium N Edition < SP1 (x86),
Microsoft Windows 7 Ultimate Edition < SP1 (x86), Microsoft Windows 7 Ultimate N Edition < SP1 (x86), Microsoft Windows 7
Enterprise Edition < SP1 (x86), Microsoft Windows 7 Enterprise N Edition < SP1 (x86), Microsoft Windows 7 Professional Edition <
SP1 (x86), Microsoft Windows 7 Starter Edition < SP1 (x86), Microsoft Windows 7 Starter N Edition < SP1 (x86)
MS12-020: Security Update for Windows 7 SP0 (KB2667402)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows XP Professional SP2 (x86_64)
MS12-020: Security Update for Windows XP x64 Edition (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows XP Professional SP3 (x86), Microsoft Windows XP Home SP3 (x86), Microsoft Windows XP Media Center Edition
2005 SP3 (x86), Microsoft Windows XP Tablet PC Edition 2005 SP3 (x86)
MS12-020: Security Update for Windows XP (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Server 2008 SP2 (x86_64), Microsoft Windows Server 2008 Enterprise Edition SP2 (x86_64), Microsoft Windows
Server 2008 Standard Edition SP2 (x86_64), Microsoft Windows Server 2008 Datacenter Edition SP2 (x86_64), Microsoft Windows
Server 2008 HPC Edition SP2 (x86_64), Microsoft Windows Server 2008 Web Edition SP2 (x86_64), Microsoft Windows Server 2008
Storage Edition SP2 (x86_64), Microsoft Windows Small Business Server 2008 SP2 (x86_64), Microsoft Windows Essential Business
Server 2008 SP2 (x86_64)
MS12-020: Security Update for Windows Server 2008 x64 Edition (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Server 2008 R2 SP1 OR < SP1 (ia64), Microsoft Windows Server 2008 R2, Enterprise Edition SP1 OR < SP1
(ia64), Microsoft Windows Server 2008 R2, Standard Edition SP1 OR < SP1 (ia64), Microsoft Windows Server 2008 R2, Datacenter
Edition SP1 OR < SP1 (ia64), Microsoft Windows Server 2008 R2, Web Edition SP1 OR < SP1 (ia64)
MS12-020: Security Update for Windows Server 2008 R2 for Itanium-based Systems (KB2667402)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows 7 SP1 (x86), Microsoft Windows 7 Home, Basic Edition SP1 (x86), Microsoft Windows 7 Home, Basic N Edition
SP1 (x86), Microsoft Windows 7 Home, Premium Edition SP1 (x86), Microsoft Windows 7 Home, Premium N Edition SP1 (x86),
Microsoft Windows 7 Ultimate Edition SP1 (x86), Microsoft Windows 7 Ultimate N Edition SP1 (x86), Microsoft Windows 7 Enterprise
Edition SP1 (x86), Microsoft Windows 7 Enterprise N Edition SP1 (x86), Microsoft Windows 7 Professional Edition SP1 (x86),
Microsoft Windows 7 Starter Edition SP1 (x86), Microsoft Windows 7 Starter N Edition SP1 (x86)
MS12-020: Security Update for Windows 7 (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Vista SP2 (x86_64), Microsoft Windows Vista Home, Basic Edition SP2 (x86_64), Microsoft Windows Vista Home,
Basic N Edition SP2 (x86_64), Microsoft Windows Vista Home, Premium Edition SP2 (x86_64), Microsoft Windows Vista Ultimate
Edition SP2 (x86_64), Microsoft Windows Vista Enterprise Edition SP2 (x86_64), Microsoft Windows Vista Business Edition SP2
(x86_64), Microsoft Windows Vista Business N Edition SP2 (x86_64), Microsoft Windows Vista Starter Edition SP2 (x86_64)
MS12-020: Security Update for Windows Vista for x64-based Systems (KB2621440)
Page 20
Audit Report
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Server 2003, Datacenter Edition SP2 (x86), Microsoft Windows Server 2003 SP2 (x86), Microsoft Windows Server
2003, Standard Edition SP2 (x86), Microsoft Windows Server 2003, Enterprise Edition SP2 (x86), Microsoft Windows Server 2003,
Web Edition SP2 (x86), Microsoft Windows Small Business Server 2003 SP2 (x86)
MS12-020: Security Update for Windows Server 2003 (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Embedded Standard 7 SP1 (x86)
MS12-020: Security Update for Windows Embedded Standard 7 (KB2667402)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Server 2003, Datacenter Edition SP2 (x86_64), Microsoft Windows Server 2003 SP2 (x86_64), Microsoft Windows
Server 2003, Standard Edition SP2 (x86_64), Microsoft Windows Server 2003, Enterprise Edition SP2 (x86_64), Microsoft Windows
Server 2003, Web Edition SP2 (x86_64), Microsoft Windows Small Business Server 2003 SP2 (x86_64)
MS12-020: Security Update for Windows Server 2003 x64 Edition (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Embedded Standard 7 SP1 (x86_64)
MS12-020: Security Update for Windows Embedded Standard 7 for x64-based Systems (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows 7 SP1 (x86_64), Microsoft Windows 7 Home, Basic Edition SP1 (x86_64), Microsoft Windows 7 Home, Basic N
Edition SP1 (x86_64), Microsoft Windows 7 Home, Premium Edition SP1 (x86_64), Microsoft Windows 7 Home, Premium N Edition
SP1 (x86_64), Microsoft Windows 7 Ultimate Edition SP1 (x86_64), Microsoft Windows 7 Ultimate N Edition SP1 (x86_64), Microsoft
Windows 7 Enterprise Edition SP1 (x86_64), Microsoft Windows 7 Enterprise N Edition SP1 (x86_64), Microsoft Windows 7
Professional Edition SP1 (x86_64), Microsoft Windows 7 Starter Edition SP1 (x86_64), Microsoft Windows 7 Starter N Edition SP1
(x86_64)
MS12-020: Security Update for Windows 7 for x64-based Systems (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Server 2003, Datacenter Edition SP2 (ia64), Microsoft Windows Server 2003 SP2 (ia64), Microsoft Windows
Server 2003, Standard Edition SP2 (ia64), Microsoft Windows Server 2003, Enterprise Edition SP2 (ia64), Microsoft Windows Server
2003, Web Edition SP2 (ia64), Microsoft Windows Small Business Server 2003 SP2 (ia64)
MS12-020: Security Update for Windows Server 2003 for Itanium-based Systems (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Server 2008 R2 SP1 OR < SP1 (ia64), Microsoft Windows Server 2008 R2, Enterprise Edition SP1 OR < SP1
(ia64), Microsoft Windows Server 2008 R2, Standard Edition SP1 OR < SP1 (ia64), Microsoft Windows Server 2008 R2, Datacenter
Edition SP1 OR < SP1 (ia64), Microsoft Windows Server 2008 R2, Web Edition SP1 OR < SP1 (ia64)
MS12-020: Security Update for Windows Server 2008 R2 for Itanium-based Systems (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
•Microsoft Windows Server 2008 R2 SP1 OR < SP1 (x86_64), Microsoft Windows Server 2008 R2, Enterprise Edition SP1 OR < SP1
(x86_64), Microsoft Windows Server 2008 R2, Standard Edition SP1 OR < SP1 (x86_64), Microsoft Windows Server 2008 R2,
Datacenter Edition SP1 OR < SP1 (x86_64), Microsoft Windows Server 2008 R2, Web Edition SP1 OR < SP1 (x86_64)
MS12-020: Security Update for Windows Server 2008 R2 x64 Edition (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
Page 21
Audit Report
•Microsoft Windows Server 2008 SP2 (x86), Microsoft Windows Server 2008 Enterprise Edition SP2 (x86), Microsoft Windows Server
2008 Standard Edition SP2 (x86), Microsoft Windows Server 2008 Datacenter Edition SP2 (x86), Microsoft Windows Server 2008 HPC
Edition SP2 (x86), Microsoft Windows Server 2008 Web Edition SP2 (x86), Microsoft Windows Server 2008 Storage Edition SP2 (x86),
Microsoft Windows Small Business Server 2008 SP2 (x86), Microsoft Windows Essential Business Server 2008 SP2 (x86)
MS12-020: Security Update for Windows Server 2008 (KB2621440)
Download and apply the patch from: http://go.microsoft.com/fwlink/?LinkId=232664
3.1.7. SNMP credentials transmitted in cleartext (snmp-cleartext-credential)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Successfully authenticated to the SNMP v1/v2c service.
10.220.251.46:161
Successfully authenticated to the SNMP v1/v2c service.
References:
Source
Reference
CERT
CA-2002-03
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.8. Default or Guessable SNMP community names: ilmi (snmp-read-0003)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"ilmi" is a default on a number of SNMP servers.
Page 22
Audit Report
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
The community string "ilmi" may indicate a Cisco IOS specific vulnerability. If you are running a version of Cisco IOS please see the
specific solution below.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[ilmi] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
The following steps are recommended for dealing with this vulnerability:
1. If you do not absolutely need SNMP, disable it. SNMP version 1 is inherently insecure. SNMP version 3 provides more complex
authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
For Cisco IOS, the following updates are available:
Cisco IOS 11.0:
Cisco Upgrade IOS 11.0(22a)
http://www.cisco.com
Cisco IOS 11.1IA:
Cisco Upgrade IOS 11.1(28)IA1
http://www.cisco.com/
Cisco IOS 11.1CT:
Cisco Upgrade IOS 12.0(11)ST2
http://www.cisco.com/
Page 23
Audit Report
Cisco IOS 11.1CC:
Cisco Upgrade IOS 11.1(36)CC1
http://www.cisco.com/
Cisco IOS 11.1CA:
Cisco Upgrade IOS 11.1(36)CA1
http://www.cisco.com/
Cisco IOS 11.1AA:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 11.1:
Cisco Upgrade IOS 11.1(24a)
http://www.cisco.com/
Cisco IOS 11.2WA3:
Cisco Upgrade IOS 12.0(10)W(18b)
http://www.cisco.com/
Cisco Upgrade IOS 12.0(13)W5(19b)
http://www.cisco.com/
Cisco IOS 11.2SA:
Cisco Upgrade IOS 12.0(5)WC
http://www.cisco.com/
Cisco IOS 11.2P:
Cisco Upgrade IOS 11.2(25a)P
http://www.cisco.com/
Cisco IOS 11.2GS:
Cisco Upgrade IOS 12.0(15)S1
Page 24
Audit Report
http://www.cisco.com/
Cisco IOS 11.2BC:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 11.2(9)XA:
Cisco Upgrade IOS 11.2(9)XA1
http://www.cisco.com/
Cisco IOS 11.2(4)XA:
Cisco Upgrade IOS 11.2(25a)P
http://www.cisco.com/
Cisco IOS 11.3WA4:
Cisco Upgrade IOS 12.0(10)W(18b)
http://www.cisco.com/
Cisco Upgrade IOS 12.0(13)W5(19b)
http://www.cisco.com/
Cisco IOS 11.3T:
Cisco Upgrade IOS 11.3(11b)T1
http://www.cisco.com/
Cisco IOS 11.3NA:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 11.3MA:
Cisco Upgrade IOS 11.3(1)MA8
http://www.cisco.com/
Cisco IOS 11.3DB:
Page 25
Audit Report
Cisco Upgrade IOS 12.1(4)DB1
http://www.cisco.com/
Cisco IOS 11.3DA:
Cisco Upgrade IOS 12.1(5)DA1
http://www.cisco.com/
Cisco IOS 11.3AA:
Cisco Upgrade IOS 11.3(11a)AA
http://www.cisco.com/
Cisco IOS 11.3(2)XA:
Cisco Upgrade IOS 11.3(11b)T1
http://www.cisco.com/
Cisco IOS 11.3:
Cisco Upgrade IOS 11.3(11b)
http://www.cisco.com/
Cisco IOS 12.0XV:
Cisco Upgrade IOS 12.1(5)T5
http://www.cisco.com
Cisco IOS 12.0XS:
Cisco Upgrade IOS 12.1(5c)E8
http://www.cisco.com/
Cisco IOS 12.0XR:
Cisco Upgrade IOS 12.1(5)T5
http://www.cisco.com
Cisco IOS 12.0XQ:
Page 26
Audit Report
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XM:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XL:
Cisco Upgrade IOS 12.1(5)T5
http://www.cisco.com
Cisco IOS 12.0XK:
Cisco Upgrade IOS 12.0(7)XK4
http://www.cisco.com
Cisco IOS 12.0XJ:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XI:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XH:
Cisco Upgrade IOS 12.0(4)XH5
http://www.cisco.com
Cisco IOS 12.0XG:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XF:
Cisco Upgrade IOS 12.1(7)
Page 27
Audit Report
http://www.cisco.com/
Cisco IOS 12.0XE:
Cisco Upgrade IOS 12.0(4)XH5
http://www.cisco.com
Cisco Upgrade IOS 12.1(5c)E8
http://www.cisco.com/
Cisco IOS 12.0XD:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XC:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XB:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XA:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0WT:
Cisco Upgrade IOS 12.0(13)WT6(1)
http://www.cisco.com
Cisco IOS 12.0W5:
Cisco Upgrade IOS 12.0(10)W5(18f)
http://www.cisco.com
Cisco Upgrade IOS 12.0(10)W5(18)
Page 28
Audit Report
http://www.cisco.com
Cisco Upgrade IOS 12.0(13)W5(19)
http://www.cisco.com
Cisco Upgrade IOS 12.0(13)W5(19c)
http://www.cisco.com
Cisco Upgrade IOS 12.0(10)W5(18e)
http://www.cisco.com
Cisco IOS 12.0T:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0SX:
Cisco Upgrade IOS 12.1(5c)E8
http://www.cisco.com/
Cisco IOS 12.0ST:
Cisco IOS 12.0SL:
Cisco Upgrade IOS 12.0(14)SL1
http://www.cisco.com/
Cisco Upgrade IOS 12.1(5c)E8
http://www.cisco.com/
Cisco IOS 12.0SC:
Cisco Upgrade IOS 12.0(15)SC1
http://www.cisco.com/
Cisco IOS 12.0S:
Cisco Upgrade IOS 12.0(15)SC1
http://www.cisco.com/
Cisco IOS 12.0DC:
Page 29
Audit Report
Cisco Upgrade IOS 12.1(4)DC2
http://www.cisco.com/
Cisco IOS 12.0DB:
Cisco Upgrade IOS 12.1(4)DC2
http://www.cisco.com/
Cisco IOS 12.0DA:
Cisco IOS 12.0:
Cisco Upgrade IOS 12.0(8)
http://www.cisco.com
Cisco Upgrade IOS 12.0(16)
http://www.cisco.com/
3.1.9. Default or Guessable SNMP community names: ILMI (snmp-read-0004)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"ILMI" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
The community string "ILMI" may indicate a Cisco IOS specific vulnerability. If you are running a version of Cisco IOS please see the
specific solution below.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[ILMI] realm[]
References:
Page 30
Audit Report
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
The following steps are recommended for dealing with this vulnerability:
1. If you do not absolutely need SNMP, disable it. SNMP version 1 is inherently insecure. SNMP version 3 provides more complex
authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
For Cisco IOS, the following updates are available:
Cisco IOS 11.0:
Cisco Upgrade IOS 11.0(22a)
http://www.cisco.com
Cisco IOS 11.1IA:
Cisco Upgrade IOS 11.1(28)IA1
http://www.cisco.com/
Cisco IOS 11.1CT:
Cisco Upgrade IOS 12.0(11)ST2
http://www.cisco.com/
Cisco IOS 11.1CC:
Cisco Upgrade IOS 11.1(36)CC1
http://www.cisco.com/
Cisco IOS 11.1CA:
Cisco Upgrade IOS 11.1(36)CA1
http://www.cisco.com/
Cisco IOS 11.1AA:
Cisco Upgrade IOS 12.1(7)
Page 31
Audit Report
http://www.cisco.com/
Cisco IOS 11.1:
Cisco Upgrade IOS 11.1(24a)
http://www.cisco.com/
Cisco IOS 11.2WA3:
Cisco Upgrade IOS 12.0(10)W(18b)
http://www.cisco.com/
Cisco Upgrade IOS 12.0(13)W5(19b)
http://www.cisco.com/
Cisco IOS 11.2SA:
Cisco Upgrade IOS 12.0(5)WC
http://www.cisco.com/
Cisco IOS 11.2P:
Cisco Upgrade IOS 11.2(25a)P
http://www.cisco.com/
Cisco IOS 11.2GS:
Cisco Upgrade IOS 12.0(15)S1
http://www.cisco.com/
Cisco IOS 11.2BC:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 11.2(9)XA:
Cisco Upgrade IOS 11.2(9)XA1
http://www.cisco.com/
Cisco IOS 11.2(4)XA:
Page 32
Audit Report
Cisco Upgrade IOS 11.2(25a)P
http://www.cisco.com/
Cisco IOS 11.3WA4:
Cisco Upgrade IOS 12.0(10)W(18b)
http://www.cisco.com/
Cisco Upgrade IOS 12.0(13)W5(19b)
http://www.cisco.com/
Cisco IOS 11.3T:
Cisco Upgrade IOS 11.3(11b)T1
http://www.cisco.com/
Cisco IOS 11.3NA:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 11.3MA:
Cisco Upgrade IOS 11.3(1)MA8
http://www.cisco.com/
Cisco IOS 11.3DB:
Cisco Upgrade IOS 12.1(4)DB1
http://www.cisco.com/
Cisco IOS 11.3DA:
Cisco Upgrade IOS 12.1(5)DA1
http://www.cisco.com/
Cisco IOS 11.3AA:
Cisco Upgrade IOS 11.3(11a)AA
http://www.cisco.com/
Page 33
Audit Report
Cisco IOS 11.3(2)XA:
Cisco Upgrade IOS 11.3(11b)T1
http://www.cisco.com/
Cisco IOS 11.3:
Cisco Upgrade IOS 11.3(11b)
http://www.cisco.com/
Cisco IOS 12.0XV:
Cisco Upgrade IOS 12.1(5)T5
http://www.cisco.com
Cisco IOS 12.0XS:
Cisco Upgrade IOS 12.1(5c)E8
http://www.cisco.com/
Cisco IOS 12.0XR:
Cisco Upgrade IOS 12.1(5)T5
http://www.cisco.com
Cisco IOS 12.0XQ:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XM:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XL:
Cisco Upgrade IOS 12.1(5)T5
http://www.cisco.com
Page 34
Audit Report
Cisco IOS 12.0XK:
Cisco Upgrade IOS 12.0(7)XK4
http://www.cisco.com
Cisco IOS 12.0XJ:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XI:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XH:
Cisco Upgrade IOS 12.0(4)XH5
http://www.cisco.com
Cisco IOS 12.0XG:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XF:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XE:
Cisco Upgrade IOS 12.0(4)XH5
http://www.cisco.com
Cisco Upgrade IOS 12.1(5c)E8
http://www.cisco.com/
Cisco IOS 12.0XD:
Cisco Upgrade IOS 12.1(7)
Page 35
Audit Report
http://www.cisco.com/
Cisco IOS 12.0XC:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XB:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0XA:
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0WT:
Cisco Upgrade IOS 12.0(13)WT6(1)
http://www.cisco.com
Cisco IOS 12.0W5:
Cisco Upgrade IOS 12.0(10)W5(18f)
http://www.cisco.com
Cisco Upgrade IOS 12.0(10)W5(18)
http://www.cisco.com
Cisco Upgrade IOS 12.0(13)W5(19)
http://www.cisco.com
Cisco Upgrade IOS 12.0(13)W5(19c)
http://www.cisco.com
Cisco Upgrade IOS 12.0(10)W5(18e)
http://www.cisco.com
Cisco IOS 12.0T:
Page 36
Audit Report
Cisco Upgrade IOS 12.1(7)
http://www.cisco.com/
Cisco IOS 12.0SX:
Cisco Upgrade IOS 12.1(5c)E8
http://www.cisco.com/
Cisco IOS 12.0ST:
Cisco IOS 12.0SL:
Cisco Upgrade IOS 12.0(14)SL1
http://www.cisco.com/
Cisco Upgrade IOS 12.1(5c)E8
http://www.cisco.com/
Cisco IOS 12.0SC:
Cisco Upgrade IOS 12.0(15)SC1
http://www.cisco.com/
Cisco IOS 12.0S:
Cisco Upgrade IOS 12.0(15)SC1
http://www.cisco.com/
Cisco IOS 12.0DC:
Cisco Upgrade IOS 12.1(4)DC2
http://www.cisco.com/
Cisco IOS 12.0DB:
Cisco Upgrade IOS 12.1(4)DC2
http://www.cisco.com/
Cisco IOS 12.0DA:
Cisco IOS 12.0:
Cisco Upgrade IOS 12.0(8)
Page 37
Audit Report
http://www.cisco.com
Cisco Upgrade IOS 12.0(16)
http://www.cisco.com/
3.1.10. Default or Guessable SNMP community names: system (snmp-read-0005)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"system" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[system] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.11. Default or Guessable SNMP community names: all (snmp-read-0006)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
Page 38
Audit Report
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"all" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[all] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.12. Default or Guessable SNMP community names: monitor (snmp-read-0007)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"monitor" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[monitor] realm[]
Page 39
Audit Report
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.13. Default or Guessable SNMP community names: agent (snmp-read-0008)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"agent" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[agent] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
Page 40
Audit Report
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.14. Default or Guessable SNMP community names: manager (snmp-read-0009)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"manager" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[manager] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.15. Default or Guessable SNMP community names: OrigEquipMfr (snmp-read-0010)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"OrigEquipMfr" is a default on a number of SNMP servers.
Page 41
Audit Report
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[OrigEquipMfr] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.16. Default or Guessable SNMP community names: admin (snmp-read-0011)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"admin" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[admin] realm[]
References:
Source
Reference
Page 42
Audit Report
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.17. Default or Guessable SNMP community names: default (snmp-read-0012)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"default" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[default] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
Page 43
Audit Report
3.1.18. Default or Guessable SNMP community names: password (snmp-read-0013)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"password" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[password] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.19. Default or Guessable SNMP community names: tivoli (snmp-read-0014)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"tivoli" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Page 44
Audit Report
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[tivoli] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.20. Default or Guessable SNMP community names: openview (snmp-read-0015)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"openview" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[openview] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
Page 45
Audit Report
Source
Reference
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.21. Default or Guessable SNMP community names: community (snmp-read-0016)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"community" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[community] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.22. Default or Guessable SNMP community names: snmp (snmp-read-0017)
Page 46
Audit Report
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"snmp" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[snmp] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.23. Default or Guessable SNMP community names: Secret C0de (snmp-read-0019)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"Secret C0de" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Page 47
Audit Report
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[Secret C0de] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.24. Default or Guessable SNMP community names: security (snmp-read-0020)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"security" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[security] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Page 48
Audit Report
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.25. Default or Guessable SNMP community names: rmon (snmp-read-0022)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"rmon" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[rmon] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.26. Default or Guessable SNMP community names: rmon_admin (snmp-read-0023)
Description:
Page 49
Audit Report
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"rmon_admin" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[rmon_admin] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.27. Default or Guessable SNMP community names: hp_admin (snmp-read-0024)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"hp_admin" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
Page 50
Audit Report
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[hp_admin] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.28. Default or Guessable SNMP community names: read (snmp-read-0025)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"read" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[read] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
Page 51
Audit Report
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.29. Default or Guessable SNMP community names: write (snmp-read-0026)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"write" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[write] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.30. Default or Guessable SNMP community names: secret (snmp-read-0027)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"secret" is a default on a number of SNMP servers.
Page 52
Audit Report
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[secret] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.31. Default or Guessable SNMP community names: cable-docsis (snmp-read-0028)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"cable-docsis" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[cable-docsis] realm[]
References:
Page 53
Audit Report
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.32. Default or Guessable SNMP community names: cascade (snmp-read-0029)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"cascade" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[cascade] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
Page 54
Audit Report
3.1.33. Default or Guessable SNMP community names: ANYCOM (snmp-read-0030)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"ANYCOM" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[ANYCOM] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.34. Default or Guessable SNMP community names: proxy (snmp-read-0031)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"proxy" is a default on a number of SNMP servers, including Intel Shiva® dialup and access devices.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Page 55
Audit Report
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[proxy] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.1.35. Default or Guessable SNMP community names: NoGaH$@! (snmp-read-0032)
Description:
The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network
administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on
a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string
"NoGaH$@!" is a default on Avaya Cajun devices.
This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.116:161
Running SNMP serviceSuccessfully authenticated to the SNMP service with
credentials: uid[] pw[NoGaH$@!] realm[]
References:
Source
Reference
CVE
CVE-1999-0516
Page 56
Audit Report
Source
Reference
CVE
CVE-1999-0517
Vulnerability Solution:
1. If you do not absolutely need SNMP, disable it. SNMP versions 1 and 2c are inherently insecure. SNMP version 3 provides more
complex authentication and encryption.
2. If you must use SNMP be sure to use complex and difficult to guess community names. Use the same policy for community names
as you use for passwords.
3. Try to make all your MIB's read only. This will limit the damage an attacker can do to your network.
3.2. Severe Vulnerabilities
3.2.1. X.509 Certificate Subject CN Does Not Match the Entity Name (certificate-common-name-mismatch)
Description:
The subject common name (CN) field in the X.509 certificate does not match the name of the entity presenting the certificate.
Before issuing a certificate, a Certification Authority (CA) must check the identity of the entity requesting the certificate, as specified in
the CA's Certification Practice Statement (CPS). Thus, standard certificate validation procedures require the subject CN field of a
certificate to match the actual name of the entity presenting the certificate. For example, in a certificate presented by
"https://www.example.com/", the CN should be "www.example.com".
In order to detect and prevent active eavesdropping attacks, the validity of a certificate must be verified, or else an attacker could then
launch a man-in-the-middle attack and gain full control of the data stream. Of particular importance is the validity of the subject's CN,
that should match the name of the entity (hostname).
A CN mismatch most often occurs due to a configuration error, though it can also indicate that a man-in-the-middle attack is being
conducted.
Please note that this check may flag a false positive against servers that are properly configured using SNI.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.24:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
10.220.251.25:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
10.220.251.26:443
The subject common name found in the X.509 certificate does not seem to
Page 57
Audit Report
Affected Nodes:
Additional Information:
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
10.220.251.27:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
10.220.251.28:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
10.220.251.29:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
10.220.251.30:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
10.220.251.31:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
10.220.251.32:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
10.220.251.46:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN COMMVAULT does not match target name
specified in the site.Subject CN COMMVAULT could not be resolved to an IP
address via DNS lookup
10.220.251.64:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN huawei does not match target name specified
in the site.Subject CN huawei could not be resolved to an IP address via DNS
lookup
10.220.251.65:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN huawei does not match target name specified
in the site.Subject CN huawei could not be resolved to an IP address via DNS
lookup
10.220.251.82:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
Page 58
Audit Report
Affected Nodes:
Additional Information:
10.220.251.83:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
10.220.251.84:443
The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN Huawei does not match target name specified
in the site.Subject CN Huawei could not be resolved to an IP address via DNS
lookup
References:
None
Vulnerability Solution:
The subject's common name (CN) field in the X.509 certificate should be fixed to reflect the name of the entity presenting the certificate
(e.g., the hostname). This is done by generating a new certificate usually signed by a Certification Authority (CA) trusted by both the
client and server.
3.2.2. SMB signing disabled (cifs-smb-signing-disabled)
Description:
This system does not allow SMB signing. SMB signing allows the recipient of SMB packets to confirm their authenticity and helps
prevent man in the middle attacks against SMB. SMB signing can be configured in one of three ways: disabled entirely (least secure),
enabled, and required (most secure).
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:139
SMB signing is disabled
10.220.251.119:445
SMB signing is disabled
References:
Source
Reference
URL
http://blogs.technet.com/b/josebda/archive/2010/12/01/the-basics-of-smb-signing-covering-both-smb1-andsmb2.aspx
Vulnerability Solution:
•Microsoft Windows
Configure SMB signing for Windows
Configure the system to enable or require SMB signing as appropriate. The method and effect of doing this is system specific so
please see this TechNet article for details. Note: ensure that SMB signing configuration is done for incoming connections (Server).
Page 59
Audit Report
•Samba
Configure SMB signing for Samba
Configure Samba to enable or require SMB signing as appropriate. To enable SMB signing, put the following in the Samba
configuration file, typically smb.conf, in the global section:
server signing = auto
To require SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
server signing = mandatory
3.2.3. IPMI 2.0 RAKP RMCP+ Authentication HMAC Password Hash Exposure (ipmi2-rmcp-rakp-hmac-password-hashexposure)
Description:
The IPMI 2.0 specification supports HMAC-SHA1 and HMAC-MD5 authentication, both of which send a computed hash to the client
that can be used to mount an offline bruteforce attack of the configured password.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.64:623
Successfully negotiated IPMI RMCP+ open session request with cipher type 1
10.220.251.65:623
Successfully negotiated IPMI RMCP+ open session request with cipher type 1
References:
Source
Reference
URL
https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi
Vulnerability Solution:
•Disable IPMI
Disable IPMI entirely using the links below or by consulting your vendor's documentation:
•Dell iDRAC IPMI Configuration
•SuperMicro IPMI User Guide
•IBM IPMI device Configuration
•IPMI on linux documentation
•Cisco IPMI device Configuration
•ipmiutil User Guide
Page 60
Audit Report
•Restrict access to IPMI service(s)
Restrict access the affected IPMI service(s) using a firewall or other appropriate technology
3.2.4. X.509 Server Certificate Is Invalid/Expired (tls-server-cert-expired)
Description:
The TLS/SSL server's X.509 certificate either contains a start date in the future or is expired. Please refer to the proof for more details.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.46:443
The certificate is not valid after Sun, 21 Jun 2020 07:50:45 PKT
References:
None
Vulnerability Solution:
Obtain a new certificate and install it on the server. The exact instructions for obtaining a new certificate depend on your organization's
requirements. Generally, you will need to generate a certificate request and save the request as a file. This file is then sent to a
Certificate Authority (CA) for processing. Please ensure that the start date and the end date on the new certificate are valid.
Your organization may have its own internal Certificate Authority. If not, you may have to pay for a certificate from a trusted external
Certificate Authority.
After you have received a new certificate file from the Certificate Authority, you will have to install it on the TLS/SSL server. The exact
instructions for installing a certificate differ for each product. Please follow their documentation.
3.2.5. SMB signing not required (cifs-smb-signing-not-required)
Description:
This system enables, but does not require SMB signing. SMB signing allows the recipient of SMB packets to confirm their authenticity
and helps prevent man in the middle attacks against SMB. SMB signing can be configured in one of three ways: disabled entirely (least
secure), enabled, and required (most secure).
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:139
Smb signing is: disabled
10.220.251.119:445
Smb signing is: disabled
References:
Source
Reference
Page 61
Audit Report
Source
Reference
URL
http://blogs.technet.com/b/josebda/archive/2010/12/01/the-basics-of-smb-signing-covering-both-smb1-andsmb2.aspx
Vulnerability Solution:
•Microsoft Windows
Configure SMB signing for Windows
Configure the system to enable or require SMB signing as appropriate. The method and effect of doing this is system specific so
please see this TechNet article for details. Note: ensure that SMB signing configuration is done for incoming connections (Server).
•Samba
Configure SMB signing for Samba
Configure Samba to enable or require SMB signing as appropriate. To enable SMB signing, put the following in the Samba
configuration file, typically smb.conf, in the global section:
server signing = auto
To require SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
server signing = mandatory
3.2.6. SMB: Service supports deprecated SMBv1 protocol (cifs-smb1-deprecated)
Description:
The SMB1 protocol has been deprecated since 2014 and is considered obsolete and insecure.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:139
SMB1 is deprecated and should not be used
10.220.251.119:445
SMB1 is deprecated and should not be used
References:
Source
Reference
URL
https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
Vulnerability Solution:
•Samba
Remove/disable SMB1
For Samba systems on Linux, disabling SMB1 is quite straightforward:
Page 62
Audit Report
How to configure Samba to use SMBv2 and disable SMBv1 on Linux or Unix
•Microsoft Windows
Remove/disable SMB1
For Windows 8.1 and Windows Server 2012 R2, removing SMB1 is trivial. On older OS'es it can't be removed but should be disabled.
This article contains system-specific details:
How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server
3.2.7. SMBv2 signing not required (cifs-smb2-signing-not-required)
Description:
This system enables, but does not require SMB signing. SMB signing allows the recipient of SMB packets to confirm their authenticity
and helps prevent man in the middle attacks against SMB. SMB 2.x signing can be configured in one of two ways: not required (least
secure) and required (most secure).
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:445
Running CIFS serviceConfiguration item smb2-enabled set to 'true' matched
Configuration item smb2-signing set to 'enabled' matched
References:
Source
Reference
URL
https://blogs.technet.com/b/josebda/archive/2010/12/01/the-basics-of-smb-signing-covering-both-smb1and-smb2.aspx
Vulnerability Solution:
•Microsoft Windows
Configure SMB signing for Windows
Configure the system to enable or require SMB signing as appropriate. The method and effect of doing this is system specific so
please see this TechNet article for details. Note: ensure that SMB signing configuration is done for incoming connections (Server).
•Samba
Configure SMB signing for Samba
Configure Samba to enable or require SMB signing as appropriate. To enable SMB signing, put the following in the Samba
configuration file, typically smb.conf, in the global section:
server signing = auto
To require SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
Page 63
Audit Report
server signing = mandatory
3.2.8. Untrusted TLS/SSL server X.509 certificate (tls-untrusted-ca)
Description:
The server's TLS/SSL certificate is signed by a Certification Authority (CA) that is not well-known or trusted. This could happen if: the
chain/intermediate certificate is missing, expired or has been revoked; the server hostname does not match that configured in the
certificate; the time/date is incorrect; or a self-signed certificate is being used. The use of a self-signed certificate is not recommended
since it could indicate that a TLS/SSL man-in-the-middle attack is taking place
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.24:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.25:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.26:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.27:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.28:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.29:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.30:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.31:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.32:443
TLS/SSL certificate signed by unknown, untrusted CA:
Page 64
Audit Report
Affected Nodes:
Additional Information:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.46:443
TLS/SSL certificate signed by unknown, untrusted CA: CN=COMMVAULT -[Path does not chain with any of the trust anchors].
10.220.251.46:3389
TLS/SSL certificate signed by unknown, untrusted CA: CN=mfs-lhrbackup.mobilink.net.pk -- [Path does not chain with any of the trust anchors].
10.220.251.47:3389
TLS/SSL certificate signed by unknown, untrusted CA: CN=MFS-LHRCV2.mobilink.net.pk -- [Path does not chain with any of the trust anchors].
10.220.251.64:443
TLS/SSL certificate signed by unknown, untrusted CA: CN=Huawei IT Product
CA, O=Huawei, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.65:443
TLS/SSL certificate signed by unknown, untrusted CA: CN=Huawei IT Product
CA, O=Huawei, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.82:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.83:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
10.220.251.84:443
TLS/SSL certificate signed by unknown, untrusted CA:
EMAILADDRESS=support_e@huawei.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN -- [Path does not chain with any of the trust anchors].
References:
Source
Reference
URL
http://httpd.apache.org/docs/2.2/mod/mod_ssl.html
URL
http://nginx.org/en/docs/http/configuring_https_servers.html
URL
https://support.microsoft.com/en-us/kb/954755
Vulnerability Solution:
Ensure the common name (CN) reflects the name of the entity presenting the certificate (e.g., the hostname). If the certificate(s) or any
of the chain certificate(s) have expired or been revoked, obtain a new certificate from your Certificate Authority (CA) by following their
documentation. If a self-signed certificate is being used, consider obtaining a signed certificate from a CA.
References: Mozilla: Connection Untrusted ErrorSSLShopper: SSL Certificate Not Trusted ErrorWindows/IIS certificate chain config
Apache SSL configNginx SSL configCertificateChain.io
3.2.9. Database Open Access (database-open-access)
Description:
The database allows any remote system the ability to connect to it. It is recommended to limit direct access to trusted systems because
databases may contain sensitive data, and new vulnerabilities and exploits are discovered routinely for them. For this reason, it is a
violation of PCI DSS section 1.3.6 to have databases listening on ports accessible from the Internet, even when protected with secure
Page 65
Audit Report
authentication mechanisms.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.36:1521
Running Oracle TNS Listener service
10.220.251.46:1434
Running Microsoft SQL Monitor service
10.220.251.48:1521
Running Oracle TNS Listener service
10.220.251.49:1521
Running Oracle TNS Listener service
10.220.251.50:1524
Running Oracle TNS Listener service
10.220.251.51:1521
Running Oracle TNS Listener service
10.220.251.52:1521
Running Oracle TNS Listener service
10.220.251.53:1524
Running Oracle TNS Listener service
10.220.251.54:1521
Running Oracle TNS Listener service
10.220.251.56:1524
Running Oracle TNS Listener service
10.220.251.57:1521
Running Oracle TNS Listener service
10.220.251.58:1521
Running Oracle TNS Listener service
10.220.251.59:1524
Running Oracle TNS Listener service
10.220.251.60:1521
Running Oracle TNS Listener service
10.220.251.60:1524
Running Oracle TNS Listener service
10.220.251.72:1521
Running Oracle TNS Listener service
10.220.251.72:1524
Running Oracle TNS Listener service
References:
Source
Reference
URL
https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf
Vulnerability Solution:
Configure the database server to only allow access to trusted systems. For example, the PCI DSS standard requires you to place the
database in an internal network zone, segregated from the DMZ
3.2.10. Missing HttpOnly Flag From Cookie (http-cookie-http-only-flag)
Description:
HttpOnly is an additional flag included in a Set-Cookie HTTP response header. If supported by the browser, using the HttpOnly flag
when generating a cookie helps mitigate the risk of client side script accessing the protected cookie. If a browser that supports HttpOnly
detects a cookie containing the HttpOnly flag, and client side script code attempts to read the cookie, the browser returns an empty
string as the result. This causes the attack to fail by preventing the malicious (usually XSS) code from sending the data to an attacker's
Page 66
Audit Report
website.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.46:80
Cookie is not marked as HttpOnly: 'csrf=jl55zt6paog5; path=/adminconsole;
domain=10.220.251.46'
URL: http://10.220.251.46/adminconsole/wcSSO.do
10.220.251.46:443
Cookie is not marked as HttpOnly: 'csrf=-1feke8f4jl9wn; path=/; secure;
domain=10.220.251.46'
URL: https://10.220.251.46/webconsole/
References:
Source
Reference
OWASP-2010
A3
OWASP-2013
A2
URL
http://msdn.microsoft.com/en-us/library/ms533046.aspx
URL
https://www.owasp.org/index.php/HttpOnly
Vulnerability Solution:
For each cookie generated by your web-site, add the "HttpOnly" flag to the cookie. For example:
Set-Cookie: <name>=<value>[; <Max-Age>=<age>]
[; expires=<date>][; domain=<domain_name>]
[; path=<some_path>][; secure][; HttpOnly]
3.2.11. Microsoft IIS default installation/welcome page installed (http-iis-default-install-page)
Description:
The IIS default installation or "Welcome" page is installed on this server. This usually indicates a newly installed server which has not
yet been configured properly and which may not be known about.
In many cases, IIS is installed by default and the user may not be aware that the web server is running. These servers are rarely
patched and rarely monitored, providing hackers with a convenient target that is not likely to trip any alarms.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.46:81
Running HTTP serviceProduct IIS exists -- Microsoft IISHTTP GET request to
Page 67
Audit Report
Affected Nodes:
Additional Information:
http://10.220.251.46:81/
HTTP response code was an expected 200
HTTP header 'Content-Location' not present
HTTP response code was an expected 200HTTP response code was an
expected 200HTTP response code was an expected 200HTTP response code
was an expected 200HTTP response code was an expected 200HTTP
response code was an expected 200HTTP response code was an expected
200HTTP response code was an expected 200
1: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://ww...
2: <html xmlns="http://www.w3.org/1999/xhtml">
3: <head>
4: <meta http-equiv="Content-Type" content="text/html; charset=iso-885...
5: <title>IIS Windows Server</title>
10.220.251.46:82
Running HTTP serviceProduct IIS exists -- Microsoft IISHTTP GET request to
http://10.220.251.46:82/
HTTP response code was an expected 200
HTTP header 'Content-Location' not present
HTTP response code was an expected 200HTTP response code was an
expected 200HTTP response code was an expected 200HTTP response code
was an expected 200HTTP response code was an expected 200HTTP
response code was an expected 200HTTP response code was an expected
200HTTP response code was an expected 200
1: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://ww...
2: <html xmlns="http://www.w3.org/1999/xhtml">
3: <head>
4: <meta http-equiv="Content-Type" content="text/html; charset=iso-885...
5: <title>IIS Windows Server</title>
References:
Source
Reference
OSVDB
2117
Vulnerability Solution:
If this server is required to provide necessary functionality, then the default page should be replaced with relevant content. Otherwise,
this server should be removed from the network, following the security principle of minimum complexity.
If the server is not needed, it can be disabled in the following way: in the Services window of the Control Panel's Administrative Tools
section, right-click on the 'World Wide Web Server' entry and select 'Stop'. Set its startup type to 'Manual' so that it does not restart if
the machine is rebooted (this is done by selecting 'Properties' in the right-click menu).
3.2.12. IPMI 1.5 GetChannelAuth Response Information Disclosure (ipmi15-getchannelauth-disclosure)
Description:
Page 68
Audit Report
The IPMI 1.5 specification requires that a response to a "Get Channel Authentication Capabilities" request will indicate if a null
username or null password is configured for any account.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.64:623
Running ASF-RMCP serviceConfiguration item ipmi_user_null set to '0'
matchedConfiguration item ipmi_user_anonymous set to '0' matched
10.220.251.65:623
Running ASF-RMCP serviceConfiguration item ipmi_user_null set to '0'
matchedConfiguration item ipmi_user_anonymous set to '0' matched
References:
Source
Reference
URL
https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi
Vulnerability Solution:
•Disable IPMI
Disable IPMI entirely using the links below or by consulting your vendor's documentation:
•Dell iDRAC IPMI Configuration
•SuperMicro IPMI User Guide
•IBM IPMI device Configuration
•IPMI on linux documentation
•Cisco IPMI device Configuration
•ipmiutil User Guide
•Restrict access to IPMI service(s)
Restrict access the affected IPMI service(s) using a firewall or other appropriate technology
3.2.13. NTP: Traffic Amplification in CTL_OP_REQ_NONCE feature of ntpd (ntp-r7-2014-12-reqnonce-drdos)
Description:
An NTP control (mode 6) message with the CTL_OP_REQ_NONCE (12) opcode will generate a single reply that is larger (44 bytes)
than the request (12 bytes). This traffic amplification vulnerability can be used to conduct DRDoS attacks.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.36:123
Running NTP serviceOne 12-byte NTP version 2 mode 6 opcode 12 request
with 0-byte payload resulted in no packet amplification and a 32-byte bandwidth
Page 69
Audit Report
Affected Nodes:
Additional Information:
amplification:44-byte NTP version 2 mode 6 opcode 12 response with 32-byte
payload
One 12-byte NTP version 3 mode 6 opcode 12 request with 0-byte payload
resulted in no packet amplification and a 32-byte bandwidth amplification:44byte NTP version 3 mode 6 opcode 12 response with 32-byte payload
One 12-byte NTP version 4 mode 6 opcode 12 request with 0-byte payload
resulted in no packet amplification and a 32-byte bandwidth amplification:44byte NTP version 4 mode 6 opcode 12 response with 32-byte payload
References:
Source
Reference
URL
https://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplificationvulnerabilities-in-ntp-allow-even-more-drdos-attacks
Vulnerability Solution:
Apply a restrict option to all hosts that are not authorized to perform NTP queries. For example, to deny query requests from all clients,
put the following in the NTP configuration file, typically /etc/ntp.conf, and restart the NTP service:
restrict default nomodify nopeer noquery notrap
3.2.14. TLS/SSL Birthday attacks on 64-bit block ciphers (SWEET32) (ssl-cve-2016-2183-sweet32)
Description:
Legacy block ciphers having a block size of 64 bits are vulnerable to a practical collision attack when used in CBC mode. All versions
of the SSL/TLS protocols that support cipher suites which use 3DES as the symmetric encryption cipher are affected. The security of a
block cipher is often reduced to the key size k: the best attack should be the exhaustive search of the key, with complexity 2 to the
power of k. However, the block size n is also an important security parameter, defining the amount of data that can be encrypted under
the same key. This is particularly important when using common modes of operation: we require block ciphers to be secure with up to 2
to the power of n queries, but most modes of operation (e.g. CBC, CTR, GCM, OCB, etc.) are unsafe with more than 2 to the power of
half n blocks of message (the birthday bound). With a modern block cipher with 128-bit blocks such as AES, the birthday bound
corresponds to 256 exabytes. However, for a block cipher with 64-bit blocks, the birthday bound corresponds to only 32 GB, which is
easily reached in practice. Once a collision between two cipher blocks occurs it is possible to use the collision to extract the plain text
data.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:22
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
10.220.251.46:3389
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHATLS 1.1 ciphers:
Page 70
Audit Report
Affected Nodes:
Additional Information:
TLS_RSA_WITH_3DES_EDE_CBC_SHATLS 1.2 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
10.220.251.47:3389
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHATLS 1.1 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHATLS 1.2 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
References:
Source
Reference
CVE
CVE-2016-2183
URL
https://sweet32.info/
URL
https://www.openssl.org/blog/blog/2016/08/24/sweet32
URL
https://access.redhat.com/articles/2548661
Vulnerability Solution:
Configure the server to disable support for 3DES suite.
For Microsoft IIS web servers, see Microsoft Knowledgebase article 245030 for instructions on disabling 3DES cipher suite.
The following recommended configuration provides a higher level of security. This configuration is compatible with Firefox 27, Chrome
22, IE 11, Opera 14 and Safari 7. SSLv2, SSLv3, and TLSv1 protocols are not recommended in this configuration. Instead, use
TLSv1.1 and TLSv1.2 protocols.
Refer to your server vendor documentation to apply the recommended cipher configuration:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSAAES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSAAES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
3.2.15. Click Jacking (http-generic-click-jacking)
Description:
Clickjacking, also known as a UI redress attack, is a method in which an attacker uses multiple transparent or opaque layers to trick a
user into clicking a button or link on a page other than the one they believe they are clicking. Thus, the attacker is "hijacking" clicks
meant for one page and routing the user to an illegitimate page.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.46:81
Running HTTP serviceHTTP request to http://10.220.251.46:81/
HTTP response code was an expected 200
1: text/html
HTTP header 'Content-Type' was present and matched expectation
Page 71
Audit Report
Affected Nodes:
Additional Information:
HTTP header 'Content-Security-Policy' not present
HTTP header 'X-Frame-Options' not present
10.220.251.46:82
Running HTTP serviceHTTP request to http://10.220.251.46:82/
HTTP response code was an expected 200
1: text/html
HTTP header 'Content-Type' was present and matched expectation
HTTP header 'Content-Security-Policy' not present
HTTP header 'X-Frame-Options' not present
References:
Source
Reference
URL
https://www.owasp.org/index.php/Clickjacking
Vulnerability Solution:
Send the HTTP response headers with X-Frame-Options that instruct the browser to restrict framing where it is not allowed.
3.2.16. IPMI 2.0 RAKP RMCP+ Authentication Username Disclosure (ipmi2-rmcp-rakp-username-disclosure)
Description:
The IPMI 2.0 specification supports RMCP+ authentication, which allows a pre-authenticated client to confirm the existence of a
configured username
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.64:623
Successfully negotiated IPMI RMCP+ open session request with cipher type 1
10.220.251.65:623
Successfully negotiated IPMI RMCP+ open session request with cipher type 1
References:
Source
Reference
URL
https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi
Vulnerability Solution:
•Disable IPMI
Disable IPMI entirely using the links below or by consulting your vendor's documentation:
•Dell iDRAC IPMI Configuration
•SuperMicro IPMI User Guide
•IBM IPMI device Configuration
Page 72
Audit Report
•IPMI on linux documentation
•Cisco IPMI device Configuration
•ipmiutil User Guide
•Restrict access to IPMI service(s)
Restrict access the affected IPMI service(s) using a firewall or other appropriate technology
3.2.17. jQuery Vulnerability: CVE-2019-11358 (jquery-cve-2019-11358)
Description:
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of
Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native
Object.prototype.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.24:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.25:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.26:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.27:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.28:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.29:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.30:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.31:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.32:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
References:
Source
Reference
Page 73
Audit Report
Source
Reference
BID
108023
CVE
CVE-2019-11358
DEBIAN
DSA-4434
DEBIAN
DSA-4460
REDHAT
RHBA-2019:1570
REDHAT
RHSA-2019:1456
REDHAT
RHSA-2019:2587
REDHAT
RHSA-2019:3023
REDHAT
RHSA-2019:3024
URL
https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
Vulnerability Solution:
< 3.4.0
Download and apply the upgrade from: https://jquery.com/download/
3.2.18. jQuery Vulnerability: CVE-2020-11022 (jquery-cve-2020-11022)
Description:
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one
of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in
jQuery 3.5.0.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.24:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.25:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.26:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.27:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.28:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.29:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.30:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
Page 74
Audit Report
Affected Nodes:
Additional Information:
3.2.1
10.220.251.31:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.32:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
References:
Source
Reference
CVE
CVE-2020-11022
DEBIAN
DSA-4693
URL
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
URL
https://jquery.com/upgrade-guide/3.5/
Vulnerability Solution:
< 3.5.0
Download and apply the upgrade from: https://jquery.com/download/
3.2.19. jQuery Vulnerability: CVE-2020-11023 (jquery-cve-2020-11023)
Description:
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources
- even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted
code. This problem is patched in jQuery 3.5.0.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.24:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.25:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.26:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.27:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.28:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.29:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
Page 75
Audit Report
Affected Nodes:
Additional Information:
10.220.251.30:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.31:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
10.220.251.32:443
Running HTTPS serviceVulnerable version of component jQuery found -- jQuery
3.2.1
References:
Source
Reference
CVE
CVE-2020-11023
DEBIAN
DSA-4693
URL
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released
URL
https://jquery.com/upgrade-guide/3.5/
Vulnerability Solution:
< 3.5.0
Download and apply the upgrade from: https://jquery.com/download/
3.2.20. TLS/SSL Server Supports RC4 Cipher Algorithms (CVE-2013-2566) (rc4-cve-2013-2566)
Description:
Recent cryptanalysis results exploit biases in the RC4 keystream to recover repeatedly encrypted plaintexts. As a result, RC4 can no
longer be seen as providing a sufficient level of security for SSL/TLS sessions. It has many single-byte biases, which makes it easier for
remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the
same plaintext.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:22
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_RSA_WITH_RC4_128_MD5TLS_RSA_WITH_RC4_128_SHA
References:
Source
Reference
CVE
CVE-2013-2566
URL
http://www.isg.rhul.ac.uk/tls/
URL
https://tools.ietf.org/html/rfc7465
URL
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915295
Page 76
Audit Report
Source
Reference
URL
https://wiki.mozilla.org/Security/Server_Side_TLS
URL
https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet#Rule__Only_Support_Strong_Cryptographic_Ciphers
URL
http://support.microsoft.com/kb/245030/
Vulnerability Solution:
Configure the server to disable support for RC4 ciphers.
For Microsoft IIS web servers, see Microsoft Knowledgebase article 245030 for instructions on disabling rc4 ciphers.
The following recommended configuration provides a higher level of security. This configuration is compatible with Firefox 27, Chrome
22, IE 11, Opera 14 and Safari 7. SSLv2, SSLv3, and TLSv1 protocols are not recommended in this configuration. Instead, use
TLSv1.1 and TLSv1.2 protocols.
Refer to your server vendor documentation to apply the recommended cipher configuration:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSAAES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSAAES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
3.2.21. SSH Server Supports diffie-hellman-group1-sha1 (ssh-cve-2015-4000)
Description:
The prime modulus offered when diffie-hellman-group1-sha1 is used only has a size of 1024 bits. This size is considered weak and
within theoretical range of the so-called Logjam attack.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.24:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
10.220.251.25:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
10.220.251.26:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
10.220.251.27:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
10.220.251.28:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
10.220.251.29:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
10.220.251.30:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
10.220.251.31:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
10.220.251.32:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
10.220.251.82:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
10.220.251.83:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
Page 77
Audit Report
Affected Nodes:
Additional Information:
10.220.251.84:22
Running SSH serviceInsecure key exchange in use: diffie-hellman-group1-sha1
References:
Source
Reference
CVE
CVE-2015-4000
URL
https://weakdh.org/
Vulnerability Solution:
Remove ssh-diffie-hellman-group1-sha1 from the KexAlgorithms list specified in sshd_config.
3.2.22. SSH Server Supports Weak Key Exchange Algorithms (ssh-weak-kex-algorithms)
Description:
The server supports one or more weak key exchange algorithms. It is highly adviseable to remove weak key exchange algorithm
support from SSH configuration files on hosts to prevent them from being used to establish connections.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.24:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.25:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.26:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.27:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.28:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.29:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.30:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.31:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.32:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.64:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup-exchange-sha1
Page 78
Audit Report
Affected Nodes:
Additional Information:
10.220.251.65:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup-exchange-sha1
10.220.251.82:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.83:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
10.220.251.84:22
Running SSH serviceInsecure key exchange algorithms in use: diffie-hellmangroup1-sha1,diffie-hellman-group-exchange-sha1
References:
Source
Reference
URL
https://wiki.mozilla.org/Security/Guidelines/OpenSSH
Vulnerability Solution:
Refer to this guide on what KEX algorithms to permit in your SSH configuration.
3.2.23. TLS/SSL Server is enabling the BEAST attack (ssl-cve-2011-3389-beast)
Description:
The SSL protocol, as used in certain configurations of Microsoft Windows and browsers such as Microsoft Internet Explorer, Mozilla
Firefox, Google Chrome, Opera (and other products negotiating SSL connections) encrypts data by using CBC mode with chained
initialization vectors. This potentially allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosenboundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the
Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack. By supporting the affected protocols and ciphers,
the server is enabling the clients in to being exploited.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:22
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHATLS_RSA_WITH_AES_256_CBC_SHA
10.220.251.46:443
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
10.220.251.46:3389
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
Page 79
Audit Report
Affected Nodes:
Additional Information:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHATLS_RSA_WITH_AES_256_CBC_SHA
10.220.251.47:3389
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHATLS_RSA_WITH_AES_256_CBC_SHA
References:
Source
Reference
CVE
CVE-2011-3389
URL
http://vnhacker.blogspot.co.uk/2011/09/beast.html
Vulnerability Solution:
There is no server-side mitigation available against the BEAST attack. The only option is to disable the affected protocols (SSLv3 and
TLS 1.0). The only fully safe configuration is to use Authenticated Encryption with Associated Data (AEAD), e.g. AES-GCM, AES-CCM
in TLS 1.2.
3.2.24. Self-signed TLS/SSL certificate (ssl-self-signed-certificate)
Description:
The server's TLS/SSL certificate is self-signed. Self-signed certificates cannot be trusted by default, especially because TLS/SSL manin-the-middle attacks typically use self-signed certificates to eavesdrop on TLS/SSL connections.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.46:443
TLS/SSL certificate is self-signed.
10.220.251.46:3389
TLS/SSL certificate is self-signed.
10.220.251.47:3389
TLS/SSL certificate is self-signed.
References:
None
Vulnerability Solution:
Obtain a new TLS/SSL server certificate that is NOT self-signed and install it on the server. The exact instructions for obtaining a new
certificate depend on your organization's requirements. Generally, you will need to generate a certificate request and save the request
as a file. This file is then sent to a Certificate Authority (CA) for processing. Your organization may have its own internal Certificate
Authority. If not, you may have to pay for a certificate from a trusted external Certificate Authority, such as Thawte or Verisign.
Page 80
Audit Report
3.2.25. TLS Server Supports TLS version 1.0 (tlsv1_0-enabled)
Description:
The PCI (Payment Card Industry) Data Security Standard requires a minimum of TLS v1.1 and recommends TLS v1.2. In addition,
FIPS 140-2 standard requires a minimum of TLS v1.1 and recommends TLS v1.2.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:22
Successfully connected over TLSv1.0
10.220.251.46:443
Successfully connected over TLSv1.0
10.220.251.46:3389
Successfully connected over TLSv1.0
10.220.251.47:3389
Successfully connected over TLSv1.0
References:
Source
Reference
URL
https://www.pcisecuritystandards.org/documents/Migrating_from_SSL_Early_TLS_Information%20Supple
ment_v1.pdf
URL
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf
Vulnerability Solution:
Configure the server to require clients to use TLS version 1.2 using Authenticated Encryption with Associated Data (AEAD) capable
ciphers.
3.3. Moderate Vulnerabilities
3.3.1. HTTP OPTIONS Method Enabled (http-options-method-enabled)
Description:
Web servers that respond to the OPTIONS HTTP method expose what other methods are supported by the web server, allowing
attackers to narrow and intensify their efforts.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.46:81
OPTIONS method returned values including itself
10.220.251.46:82
OPTIONS method returned values including itself
References:
Page 81
Audit Report
Source
Reference
URL
https://www.owasp.org/index.php/Test_HTTP_Methods_(OTG-CONFIG-006)
Vulnerability Solution:
•Disable HTTP OPTIONS method
Disable HTTP OPTIONS method on your web server. Refer to your web server's instruction manual on how to do this.
Web servers that respond to the OPTIONS HTTP method expose what other methods are supported by the web server, allowing
attackers to narrow and intensify their efforts.
•Apache HTTPD
Disable HTTP OPTIONS Method for Apache
Disable the OPTIONS method by including the following in the Apache configuration:
<Limit OPTIONS>
Order deny,allow
Deny from all
</Limit>
•Microsoft IIS
Disable HTTP OPTIONS Method for IIS
Disable the OPTIONS method by doing the following in the IIS manager
1. Select relevent site
2. Select Request filtering and change to HTTP verb tab
3. Select Deny Verb from the actions pane
4. Type OPTIONS into the provided text box and press OK
•nginx nginx
Disable HTTP OPTIONS Method for nginx
Disable the OPTIONS method by adding the following line to your server block, you can add other HTTP methods to be allowed to run
after POST
limit_except GET POST { deny all; }
3.3.2. SSH CBC vulnerability (ssh-cbc-ciphers)
Description:
SSH contains a vulnerability in the way certain types of errors are handled. Attacks leveraging this vulnerabilty would lead to the loss of
the SSH session. According to CPNI Vulnerability Advisory SSH:
Page 82
Audit Report
If exploited, this attack can potentially allow an attacker to recover up to 32 bits of plaintext from an arbitrary block of ciphertext from a
connection secured using the SSH protocol in the standard configuration. If OpenSSH is used in the standard configuration, then the
attacker's success probability for recovering 32 bits of plaintext is 2^{-18}. A variant of the attack against OpenSSH in the standard
configuration can verifiably recover 14 bits of plaintext with probability 2^{-14}. The success probability of the attack for other
implementations of SSH is not known.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.118:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.21:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.22:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.23:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.33:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.34:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.35:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.36:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.37:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.38:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.41:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.45:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.57:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.58:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.59:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.60:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.67:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
10.220.251.72:22
Running SSH serviceInsecure CBC ciphers in use: aes256-cbc
References:
Source
Reference
URL
https://www.kb.cert.org/vuls/id/958563
Vulnerability Solution:
SSH can be done using Counter (CTR) mode encryption. This mode generates the keystream by encrypting successive values of a
"counter" function. In order to mitigate this vulnerabilty SSH can be setup to use CTR mode rather CBC mode.
3.3.3. TLS/SSL Server Supports The Use of Static Key Ciphers (ssl-static-key-ciphers)
Page 83
Audit Report
Description:
The server is configured to support ciphers known as static key ciphers. These ciphers don't support "Forward Secrecy". In the new
specification for HTTP/2, these ciphers have been blacklisted.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:22
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHATLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_RC4_128_MD5TLS_RSA_WITH_RC4_128_SHA
10.220.251.24:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.25:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.26:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.27:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
Page 84
Audit Report
Affected Nodes:
Additional Information:
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.28:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.29:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.30:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.31:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.32:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
Page 85
Audit Report
Affected Nodes:
Additional Information:
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.36:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.46:3389
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHATLS_RSA_WITH_AES_256_CBC_SHA
TLS 1.1 ciphers: TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHATLS_RSA_WITH_AES_256_CBC_SHA
TLS 1.2 ciphers: TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
10.220.251.47:3389
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHATLS_RSA_WITH_AES_256_CBC_SHA
TLS 1.1 ciphers: TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHATLS_RSA_WITH_AES_256_CBC_SHA
TLS 1.2 ciphers: TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
10.220.251.48:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.49:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.51:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.52:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.54:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.82:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
Page 86
Audit Report
Affected Nodes:
Additional Information:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.83:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
10.220.251.84:443
Negotiated with the following insecure cipher suites: TLS 1.1 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS 1.2 ciphers:
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
References:
Source
Reference
URL
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915295
URL
https://wiki.mozilla.org/Security/Server_Side_TLS
URL
https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet#Rule__Only_Support_Strong_Cryptographic_Ciphers
URL
http://support.microsoft.com/kb/245030/
URL
https://tools.ietf.org/html/rfc7540/
Vulnerability Solution:
Configure the server to disable support for static key cipher suites.
For Microsoft IIS web servers, see Microsoft Knowledgebase article 245030 for instructions on disabling static key cipher suites.
The following recommended configuration provides a higher level of security. This configuration is compatible with Firefox 27, Chrome
22, IE 11, Opera 14 and Safari 7. SSLv2, SSLv3, and TLSv1 protocols are not recommended in this configuration. Instead, use
TLSv1.1 and TLSv1.2 protocols.
Refer to your server vendor documentation to apply the recommended cipher configuration:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSAAES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-
Page 87
Audit Report
SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSAAES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
3.3.4. TLS/SSL Server Is Using Commonly Used Prime Numbers (tls-dh-primes)
Description:
The server is using a common or default prime number as a parameter during the Diffie-Hellman key exchange. This makes the secure
session vulnerable to a precomputation attack. An attacker can spend a significant amount of time to generate a lookup/rainbow table
for a particular prime number. This lookup table can then be used to obtain the shared secret for the handshake and decrypt the
session.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.64:443
The server is using the following commonly used Diffie-Hellman primes:
ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63
b139b22514a08798e3404ddef9519b3cd3a431b302b0a6df25f14374fe1356d6d5
1c245e485b576625e7ec6f44c42e9a637ed6b0bff5cb6f406b7edee386bfb5a899f
a5ae9f24117c4b1fe649286651ece45b3dc2007cb8a163bf0598da48361c55d39
a69163fa8fd24cf5f83655d23dca3ad961c62f356208552bb9ed529077096966d6
70c354e4abc9804f1746c08ca18217c32905e462e36ce3be39e772c180e86039b
2783a2ec07a28fb5c55df06f4c52c9de2bcbf6955817183995497cea956ae515d2
261898fa051015728e5a8aacaa68ffffffffffffffff
10.220.251.65:443
The server is using the following commonly used Diffie-Hellman primes:
ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63
b139b22514a08798e3404ddef9519b3cd3a431b302b0a6df25f14374fe1356d6d5
1c245e485b576625e7ec6f44c42e9a637ed6b0bff5cb6f406b7edee386bfb5a899f
a5ae9f24117c4b1fe649286651ece45b3dc2007cb8a163bf0598da48361c55d39
a69163fa8fd24cf5f83655d23dca3ad961c62f356208552bb9ed529077096966d6
70c354e4abc9804f1746c08ca18217c32905e462e36ce3be39e772c180e86039b
2783a2ec07a28fb5c55df06f4c52c9de2bcbf6955817183995497cea956ae515d2
261898fa051015728e5a8aacaa68ffffffffffffffff
References:
Source
Reference
URL
https://weakdh.org/
URL
https://www.openssl.org/docs/man1.1.0/apps/dhparam.html
Vulnerability Solution:
Configure the server to use a randomly generated Diffie-Hellman group. It's recommend that you generate a 2048-bit group. The
simplest way of generating a new group is to use OpenSSL:
openssl dhparam -out dhparams.pem 2048
To use the DH parameters in newer versions of Apache (2.4.8 and newer) and OpenSSL 1.0.2 or later, you can directly specify your
DH params file as follows:
Page 88
Audit Report
SSLOpenSSLConfCmd DHParameters "{path to dhparams.pem}"
If you are using Apache with LibreSSL, or Apache 2.4.7 and OpenSSL 0.9.8a or later, you can append the DHparams you generated
earlier to the end of your certificate file and reload the configuration.
For other products see the remediation steps suggested by the original researchers.
3.3.5. TLS Server Supports TLS version 1.1 (tlsv1_1-enabled)
Description:
The PCI (Payment Card Industry) Data Security Standard requires a minimum of TLS v1.1 and recommends TLS v1.2. In addition,
FIPS 140-2 standard requires a minimum of TLS v1.1 and recommends TLS v1.2.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.24:443
Successfully connected over TLSv1.1
10.220.251.25:443
Successfully connected over TLSv1.1
10.220.251.26:443
Successfully connected over TLSv1.1
10.220.251.27:443
Successfully connected over TLSv1.1
10.220.251.28:443
Successfully connected over TLSv1.1
10.220.251.29:443
Successfully connected over TLSv1.1
10.220.251.30:443
Successfully connected over TLSv1.1
10.220.251.31:443
Successfully connected over TLSv1.1
10.220.251.32:443
Successfully connected over TLSv1.1
10.220.251.46:443
Successfully connected over TLSv1.1
10.220.251.46:3389
Successfully connected over TLSv1.1
10.220.251.47:3389
Successfully connected over TLSv1.1
10.220.251.64:443
Successfully connected over TLSv1.1
10.220.251.65:443
Successfully connected over TLSv1.1
10.220.251.82:443
Successfully connected over TLSv1.1
10.220.251.83:443
Successfully connected over TLSv1.1
10.220.251.84:443
Successfully connected over TLSv1.1
References:
Source
Reference
URL
https://www.pcisecuritystandards.org/documents/Migrating_from_SSL_Early_TLS_Information%20Supple
ment_v1.pdf
URL
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf
Page 89
Audit Report
Vulnerability Solution:
Configure the server to require clients to use TLS version 1.2 using Authenticated Encryption with Associated Data (AEAD) capable
ciphers.
3.3.6. ICMP timestamp response (generic-icmp-timestamp)
Description:
The remote host responded to an ICMP timestamp request. The ICMP timestamp response contains the remote host's date and time.
This information could theoretically be used against some systems to exploit weak time-based random number generators in other
services.
In addition, the versions of some operating systems can be accurately fingerprinted by analyzing their responses to invalid ICMP
timestamp requests.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.10
Able to determine remote system time.
10.220.251.100
Able to determine remote system time.
10.220.251.101
Able to determine remote system time.
10.220.251.102
Able to determine remote system time.
10.220.251.103
Able to determine remote system time.
10.220.251.104
Able to determine remote system time.
10.220.251.105
Able to determine remote system time.
10.220.251.106
Able to determine remote system time.
10.220.251.107
Able to determine remote system time.
10.220.251.108
Able to determine remote system time.
10.220.251.109
Able to determine remote system time.
10.220.251.11
Able to determine remote system time.
10.220.251.110
Able to determine remote system time.
10.220.251.111
Able to determine remote system time.
10.220.251.112
Able to determine remote system time.
10.220.251.113
Able to determine remote system time.
10.220.251.114
Able to determine remote system time.
10.220.251.115
Able to determine remote system time.
10.220.251.116
Able to determine remote system time.
10.220.251.117
Able to determine remote system time.
Page 90
Audit Report
Affected Nodes:
Additional Information:
10.220.251.118
Able to determine remote system time.
10.220.251.119
Able to determine remote system time.
10.220.251.12
Able to determine remote system time.
10.220.251.121
Able to determine remote system time.
10.220.251.122
Able to determine remote system time.
10.220.251.13
Able to determine remote system time.
10.220.251.14
Able to determine remote system time.
10.220.251.15
Able to determine remote system time.
10.220.251.16
Able to determine remote system time.
10.220.251.17
Able to determine remote system time.
10.220.251.18
Able to determine remote system time.
10.220.251.20
Able to determine remote system time.
10.220.251.21
Able to determine remote system time.
10.220.251.22
Able to determine remote system time.
10.220.251.23
Able to determine remote system time.
10.220.251.33
Able to determine remote system time.
10.220.251.34
Able to determine remote system time.
10.220.251.35
Able to determine remote system time.
10.220.251.36
Able to determine remote system time.
10.220.251.37
Able to determine remote system time.
10.220.251.38
Able to determine remote system time.
10.220.251.39
Able to determine remote system time.
10.220.251.41
Able to determine remote system time.
10.220.251.45
Able to determine remote system time.
10.220.251.46
Able to determine remote system time.
10.220.251.48
Able to determine remote system time.
10.220.251.49
Able to determine remote system time.
10.220.251.50
Able to determine remote system time.
10.220.251.51
Able to determine remote system time.
10.220.251.52
Able to determine remote system time.
10.220.251.53
Able to determine remote system time.
10.220.251.54
Able to determine remote system time.
10.220.251.56
Able to determine remote system time.
Page 91
Audit Report
Affected Nodes:
Additional Information:
10.220.251.57
Able to determine remote system time.
10.220.251.58
Able to determine remote system time.
10.220.251.59
Able to determine remote system time.
10.220.251.60
Able to determine remote system time.
10.220.251.61
Able to determine remote system time.
10.220.251.62
Able to determine remote system time.
10.220.251.63
Able to determine remote system time.
10.220.251.64
Able to determine remote system time.
10.220.251.65
Able to determine remote system time.
10.220.251.68
Able to determine remote system time.
10.220.251.69
Able to determine remote system time.
10.220.251.7
Able to determine remote system time.
10.220.251.72
Able to determine remote system time.
10.220.251.76
Able to determine remote system time.
10.220.251.77
Able to determine remote system time.
10.220.251.78
Able to determine remote system time.
10.220.251.79
Able to determine remote system time.
10.220.251.8
Able to determine remote system time.
10.220.251.80
Able to determine remote system time.
10.220.251.81
Able to determine remote system time.
10.220.251.87
Able to determine remote system time.
10.220.251.88
Able to determine remote system time.
10.220.251.89
Able to determine remote system time.
10.220.251.9
Able to determine remote system time.
10.220.251.90
Able to determine remote system time.
10.220.251.91
Able to determine remote system time.
10.220.251.92
Able to determine remote system time.
10.220.251.93
Able to determine remote system time.
10.220.251.94
Able to determine remote system time.
10.220.251.95
Able to determine remote system time.
10.220.251.96
Able to determine remote system time.
10.220.251.97
Able to determine remote system time.
10.220.251.98
Able to determine remote system time.
Page 92
Audit Report
Affected Nodes:
Additional Information:
10.220.251.99
Able to determine remote system time.
References:
Source
Reference
CVE
CVE-1999-0524
OSVDB
95
XF
306
XF
322
Vulnerability Solution:
•HP-UX
Disable ICMP timestamp responses on HP/UX
Execute the following command:
ndd -set /dev/ip ip_respond_to_timestamp_broadcast 0
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Cisco IOS
Disable ICMP timestamp responses on Cisco IOS
Use ACLs to block ICMP types 13 and 14. For example:
deny icmp any any 13
deny icmp any any 14
Note that it is generally preferable to use ACLs that block everything by default and then selectively allow certain types of traffic in. For
example, block everything and then only allow ICMP unreachable, ICMP echo reply, ICMP time exceeded, and ICMP source quench:
permit icmp any any unreachable
permit icmp any any echo-reply
permit icmp any any time-exceeded
permit icmp any any source-quench
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•SGI Irix
Disable ICMP timestamp responses on SGI Irix
IRIX does not offer a way to disable ICMP timestamp responses. Therefore, you should block ICMP on the affected host using ipfilterd,
and/or block it at any external firewalls.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Linux
Disable ICMP timestamp responses on Linux
Page 93
Audit Report
Linux offers neither a sysctl nor a /proc/sys/net/ipv4 interface to disable ICMP timestamp responses. Therefore, you should block ICMP
on the affected host using iptables, and/or block it at the firewall. For example:
ipchains -A input -p icmp --icmp-type timestamp-request -j DROP
ipchains -A output -p icmp --icmp-type timestamp-reply -j DROP
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Microsoft Windows NT, Microsoft Windows NT Workstation, Microsoft Windows NT Server, Microsoft Windows NT Advanced Server,
Microsoft Windows NT Server, Enterprise Edition, Microsoft Windows NT Server, Terminal Server Edition
Disable ICMP timestamp responses on Windows NT 4
Windows NT 4 does not provide a way to block ICMP packets. Therefore, you should block them at the firewall.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•OpenBSD
Disable ICMP timestamp responses on OpenBSD
Set the "net.inet.icmp.tstamprepl" sysctl variable to 0.
sysctl -w net.inet.icmp.tstamprepl=0
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Cisco PIX
Disable ICMP timestamp responses on Cisco PIX
A properly configured PIX firewall should never respond to ICMP packets on its external interface. In PIX Software versions 4.1(6) until
5.2.1, ICMP traffic to the PIX's internal interface is permitted; the PIX cannot be configured to NOT respond. Beginning in PIX Software
version 5.2.1, ICMP is still permitted on the internal interface by default, but ICMP responses from its internal interfaces can be
disabled with the icmp command, as follows, where <inside> is the name of the internal interface:
icmp deny any 13 <inside>
icmp deny any 14 <inside>
Don't forget to save the configuration when you are finished.
See Cisco's support document Handling ICMP Pings with the PIX Firewall for more information.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Sun Solaris
Disable ICMP timestamp responses on Solaris
Execute the following commands:
/usr/sbin/ndd -set /dev/ip ip_respond_to_timestamp 0
/usr/sbin/ndd -set /dev/ip ip_respond_to_timestamp_broadcast 0
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
Page 94
Audit Report
•Microsoft Windows 2000, Microsoft Windows 2000 Professional, Microsoft Windows 2000 Server, Microsoft Windows 2000 Advanced
Server, Microsoft Windows 2000 Datacenter Server
Disable ICMP timestamp responses on Windows 2000
Use the IPSec filter feature to define and apply an IP filter list that blocks ICMP types 13 and 14. Note that the standard TCP/IP
blocking capability under the "Networking and Dialup Connections" control panel is NOT capable of blocking ICMP (only TCP and
UDP). The IPSec filter features, while they may seem strictly related to the IPSec standards, will allow you to selectively block these
ICMP packets. See http://support.microsoft.com/kb/313190 for more information.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Microsoft Windows XP, Microsoft Windows XP Home, Microsoft Windows XP Professional, Microsoft Windows Server 2003, Microsoft
Windows Server 2003, Standard Edition, Microsoft Windows Server 2003, Enterprise Edition, Microsoft Windows Server 2003,
Datacenter Edition, Microsoft Windows Server 2003, Web Edition, Microsoft Windows Small Business Server 2003
Disable ICMP timestamp responses on Windows XP/2K3
ICMP timestamp responses can be disabled by deselecting the "allow incoming timestamp request" option in the ICMP configuration
panel of Windows Firewall.
1. Go to the Network Connections control panel.
2. Right click on the network adapter and select "properties", or select the internet adapter and select File->Properties.
3. Select the "Advanced" tab.
4. In the Windows Firewall box, select "Settings".
5. Select the "General" tab.
6. Enable the firewall by selecting the "on (recommended)" option.
7. Select the "Advanced" tab.
8. In the ICMP box, select "Settings".
9. Deselect (uncheck) the "Allow incoming timestamp request" option.
10. Select "OK" to exit the ICMP Settings dialog and save the settings.
11. Select "OK" to exit the Windows Firewall dialog and save the settings.
12. Select "OK" to exit the internet adapter dialog.
For more information, see: http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/enus/hnw_understanding_firewall.mspx?mfr=true
•Microsoft Windows Vista, Microsoft Windows Vista Home, Basic Edition, Microsoft Windows Vista Home, Basic N Edition, Microsoft
Windows Vista Home, Premium Edition, Microsoft Windows Vista Ultimate Edition, Microsoft Windows Vista Enterprise Edition,
Microsoft Windows Vista Business Edition, Microsoft Windows Vista Business N Edition, Microsoft Windows Vista Starter Edition,
Microsoft Windows Server 2008, Microsoft Windows Server 2008 Standard Edition, Microsoft Windows Server 2008 Enterprise Edition,
Microsoft Windows Server 2008 Datacenter Edition, Microsoft Windows Server 2008 HPC Edition, Microsoft Windows Server 2008
Web Edition, Microsoft Windows Server 2008 Storage Edition, Microsoft Windows Small Business Server 2008, Microsoft Windows
Essential Business Server 2008
Disable ICMP timestamp responses on Windows Vista/2008
ICMP timestamp responses can be disabled via the netsh command line utility.
1. Go to the Windows Control Panel.
Page 95
Audit Report
2. Select "Windows Firewall".
3. In the Windows Firewall box, select "Change Settings".
4. Enable the firewall by selecting the "on (recommended)" option.
5. Open a Command Prompt.
6. Enter "netsh firewall set icmpsetting 13 disable"
For more information, see: http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/enus/hnw_understanding_firewall.mspx?mfr=true
•Disable ICMP timestamp responses
Disable ICMP timestamp replies for the device. If the device does not support this level of configuration, the easiest and most effective
solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13 (timestamp request) and 14
(timestamp response).
3.3.7. TCP timestamp response (generic-tcp-timestamp)
Description:
The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's
uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their
TCP timestamps.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119
Able to determine system boot time.
10.220.251.46
Able to determine system boot time.
References:
Source
Reference
URL
http://uptime.netcraft.com
URL
http://www.forensicswiki.org/wiki/TCP_timestamps
URL
http://www.ietf.org/rfc/rfc1323.txt
Vulnerability Solution:
•Cisco
Disable TCP timestamp responses on Cisco
Run the following command to disable TCP timestamps:
no ip tcp timestamp
Page 96
Audit Report
•FreeBSD
Disable TCP timestamp responses on FreeBSD
Set the value of net.inet.tcp.rfc1323 to 0 by running the following command:
sysctl -w net.inet.tcp.rfc1323=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
net.inet.tcp.rfc1323=0
•Linux
Disable TCP timestamp responses on Linux
Set the value of net.ipv4.tcp_timestamps to 0 by running the following command:
sysctl -w net.ipv4.tcp_timestamps=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
net.ipv4.tcp_timestamps=0
•OpenBSD
Disable TCP timestamp responses on OpenBSD
Set the value of net.inet.tcp.rfc1323 to 0 by running the following command:
sysctl -w net.inet.tcp.rfc1323=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
net.inet.tcp.rfc1323=0
•Microsoft Windows NT, Microsoft Windows NT Workstation, Microsoft Windows NT Server, Microsoft Windows NT Advanced Server,
Microsoft Windows NT Server, Enterprise Edition, Microsoft Windows NT Server, Terminal Server Edition, Microsoft Windows 95,
Microsoft Windows 98, Microsoft Windows 98SE, Microsoft Windows ME, Microsoft Windows 2000, Microsoft Windows 2000
Professional, Microsoft Windows 2000 Server, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2000 Datacenter
Server, Microsoft Windows XP, Microsoft Windows XP Home, Microsoft Windows XP Professional, Microsoft Windows XP Tablet PC
Edition, Microsoft Windows CE, Microsoft Windows Server 2003, Microsoft Windows Server 2003, Standard Edition, Microsoft
Windows Server 2003, Enterprise Edition, Microsoft Windows Server 2003, Datacenter Edition, Microsoft Windows Server 2003, Web
Page 97
Audit Report
Edition, Microsoft Windows Small Business Server 2003, Microsoft Windows Server 2003 R2, Microsoft Windows Server 2003 R2,
Standard Edition, Microsoft Windows Server 2003 R2, Enterprise Edition, Microsoft Windows Server 2003 R2, Datacenter Edition,
Microsoft Windows Server 2003 R2, Web Edition, Microsoft Windows Small Business Server 2003 R2, Microsoft Windows Server 2003
R2, Express Edition, Microsoft Windows Server 2003 R2, Workgroup Edition
Disable TCP timestamp responses on Windows versions before Vista
Set the Tcp1323Opts value in the following key to 1:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
•Microsoft Windows Server 2008, Microsoft Windows Server 2008 Standard Edition, Microsoft Windows Server 2008 Enterprise Edition,
Microsoft Windows Server 2008 Datacenter Edition, Microsoft Windows Server 2008 HPC Edition, Microsoft Windows Server 2008
Web Edition, Microsoft Windows Server 2008 Storage Edition, Microsoft Windows Small Business Server 2008, Microsoft Windows
Essential Business Server 2008, Microsoft Windows Server 2008 R2, Microsoft Windows Server 2008 R2, Standard Edition, Microsoft
Windows Server 2008 R2, Enterprise Edition, Microsoft Windows Server 2008 R2, Datacenter Edition, Microsoft Windows Server 2008
R2, Web Edition, Microsoft Windows Server 2012, Microsoft Windows Server 2012 Standard Edition, Microsoft Windows Server 2012
Foundation Edition, Microsoft Windows Server 2012 Essentials Edition, Microsoft Windows Server 2012 Datacenter Edition, Microsoft
Windows Storage Server 2012, Microsoft Windows Vista, Microsoft Windows Vista Home, Basic Edition, Microsoft Windows Vista
Home, Basic N Edition, Microsoft Windows Vista Home, Premium Edition, Microsoft Windows Vista Ultimate Edition, Microsoft
Windows Vista Enterprise Edition, Microsoft Windows Vista Business Edition, Microsoft Windows Vista Business N Edition, Microsoft
Windows Vista Starter Edition, Microsoft Windows 7, Microsoft Windows 7 Home, Basic Edition, Microsoft Windows 7 Home, Basic N
Edition, Microsoft Windows 7 Home, Premium Edition, Microsoft Windows 7 Home, Premium N Edition, Microsoft Windows 7 Ultimate
Edition, Microsoft Windows 7 Ultimate N Edition, Microsoft Windows 7 Enterprise Edition, Microsoft Windows 7 Enterprise N Edition,
Microsoft Windows 7 Professional Edition, Microsoft Windows 7 Starter Edition, Microsoft Windows 7 Starter N Edition, Microsoft
Windows 8, Microsoft Windows 8 Enterprise Edition, Microsoft Windows 8 Professional Edition, Microsoft Windows 8 RT, Microsoft
Windows Longhorn Server Beta
Disable TCP timestamp responses on Windows versions since Vista
TCP timestamps cannot be reliably disabled on this OS. If TCP timestamps present enough of a risk, put a firewall capable of blocking
TCP timestamp packets in front of the affected assets.
3.3.8. NetBIOS NBSTAT Traffic Amplification (netbios-nbstat-amplification)
Description:
A NetBIOS NBSTAT query will obtain the status from a NetBIOS-speaking endpoint, which will include any names that the endpoint is
known to respond to as well as the device's MAC address for that endpoint. A NBSTAT response is roughly 3x the size of the request,
and because NetBIOS utilizes UDP, this can be used to conduct traffic amplification attacks against other assets, typically in the form of
distributed reflected denial of service (DRDoS) attacks.
Affected Nodes:
Page 98
Audit Report
Affected Nodes:
Additional Information:
10.220.251.119:137
Running CIFS Name Service serviceConfiguration item advertised-name-count
set to '3' matched
10.220.251.46:137
Running CIFS Name Service serviceConfiguration item advertised-name-count
set to '3' matched
References:
Source
Reference
CERT
TA14-017A
Vulnerability Solution:
NetBIOS can be important to the proper functioning of a Windows network depending on the design. Restrict access to the NetBIOS
service to only trusted assets.
3.3.9. NTP clock variables information disclosure (ntp-clock-variables-disclosure)
Description:
This sytem allows the internal NTP variables to be queried. These variables contain potentially sensitive information, such as the NTP
software version, operating system version, peers, and more.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.36:123
The following NTP variables were found from a readvar request: clk_jitter,
clk_wander, clock, frequency, leap, mintc, offset, peer, precision, processor,
refid, reftime, rootdelay, rootdisp, stratum, sys_jitter, system, tc, version
References:
None
Vulnerability Solution:
•Disable NTP queries
Apply a restrict option to all hosts that are not authorized to perform NTP queries. For example, to deny query requests from all
clients, put the following in the NTP configuration file, typically /etc/ntp.conf, and restart the NTP service:
restrict default nomodify nopeer noquery notrap
•Cisco
Restrict NTP readvar queries
Apply an ACL that restricts NTP readvar queries from unauthorized clients, as described in the
'Configuring an NTP Access Group' section of the Cisco IOS documentation.
Page 99
Audit Report
Alternatively, if NTP is not required, disable it entirely by running the following command:
ntp disable
3.3.10. TLS/SSL Server Supports 3DES Cipher Suite (ssl-3des-ciphers)
Description:
Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346) include cipher suites based on the 3DES (Triple Data
Encryption Standard) algorithm. Since 3DES only provides an effective security of 112 bits, it is considered close to end of life by some
agencies. Consequently, the 3DES algorithm is not included in the specifications for TLS version 1.3. ECRYPT II (from 2012)
recommends for generic application independent long-term protection at least 128 bits security. The same recommendation has also
been reported by BSI Germany (from 2015) and ANSSI France (from 2014), 128 bit is the recommended symmetric size and should be
mandatory after 2020. While NIST (from 2012) still considers 3DES being appropriate to use until the end of 2030.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.119:22
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
10.220.251.46:3389
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHATLS 1.1 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHATLS 1.2 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
10.220.251.47:3389
Negotiated with the following insecure cipher suites: TLS 1.0 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHATLS 1.1 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHATLS 1.2 ciphers:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
References:
Source
Reference
URL
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915295
URL
http://www.ecrypt.eu.org/ecrypt2/documents/D.SPA.20.pdf
URL
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf
URL
https://wiki.mozilla.org/Security/Server_Side_TLS
URL
https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet#Rule__Only_Support_Strong_Cryptographic_Ciphers
URL
http://support.microsoft.com/kb/245030/
Vulnerability Solution:
Page 100
Audit Report
Configure the server to disable support for 3DES suite.
For Microsoft IIS web servers, see Microsoft Knowledgebase article 245030 for instructions on disabling 3DES cipher suite.
The following recommended configuration provides a higher level of security. This configuration is compatible with Firefox 27, Chrome
22, IE 11, Opera 14 and Safari 7. SSLv2, SSLv3, and TLSv1 protocols are not recommended in this configuration. Instead, use
TLSv1.1 and TLSv1.2 protocols.
Refer to your server vendor documentation to apply the recommended cipher configuration:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSAAES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSAAES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
3.3.11. TLS/SSL Server Does Not Support Any Strong Cipher Algorithms (ssl-only-weak-ciphers)
Description:
The server is not configured with support for any modern, secure ciphers and only supports ciphers known to be weak against attack.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.36:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.48:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.49:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.51:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.52:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
10.220.251.54:5000
Negotiated with the following insecure cipher suites: TLS 1.2 ciphers:
TLS_RSA_WITH_AES_128_CBC_SHA256
References:
Source
Reference
URL
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915295
URL
https://wiki.mozilla.org/Security/Server_Side_TLS
URL
https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet#Rule__Only_Support_Strong_Cryptographic_Ciphers
URL
http://support.microsoft.com/kb/245030/
Page 101
Audit Report
Vulnerability Solution:
Enable support for at least one of the ciphers listed below:
•TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
•TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
•TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
•TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
•TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
•TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
•TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
•TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
3.3.12. UPnP SSDP Traffic Amplification (upnp-ssdp-amplification)
Description:
A UPnP SSDP M-SEARCH request can be used to search a network for UPNP devices. An M-SEARCH response is roughly 30x the
size of the request and can be distributed across multiple responses from multiple hosts, and because it utilizes UDP, this can be used
to conduct traffic amplification attacks against other assets, typically in the form of distributed reflected denial of service (DRDoS)
attacks.
Affected Nodes:
Affected Nodes:
Additional Information:
10.220.251.64:1900
Running UPnP-HTTPU service
10.220.251.65:1900
Running UPnP-HTTPU service
References:
Source
Reference
CERT
TA14-017A
Vulnerability Solution:
Restrict access to the UPnP service to only trusted assets.
Page 102
Audit Report
4. Discovered Services
4.1. <unknown>
4.1.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.25
tcp
2200
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.26
tcp
2200
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.28
tcp
2200
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.29
tcp
2200
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.31
tcp
2200
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.32
tcp
2200
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.46
tcp
9101
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.47
tcp
9101
0
•sslv3: false
•tlsv1_0: false
Page 103
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•tlsv1_1: false
•tlsv1_2: false
10.220.251.82
tcp
2200
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.84
tcp
2200
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
4.2. ASF-RMCP
4.2.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.64
udp
623
3
•ipmi_channel: 1
•ipmi_channel_reserved: 0
•ipmi_checksum: 32
•ipmi_command: 56
•ipmi_compat_20: 1
•ipmi_compat_md2: 0
•ipmi_compat_md5: 0
•ipmi_compat_none: 0
•ipmi_compat_oem_auth: 0
•ipmi_compat_password: 0
•ipmi_compat_reserved1: 0
•ipmi_compat_reserved2: 0
•ipmi_completion_code: 0
•ipmi_conn_15: 1
•ipmi_conn_20: 1
•ipmi_conn_reserved1: 0
•ipmi_header_checksum: 99
•ipmi_netfn: 7
•ipmi_oem_data: 0
•ipmi_oem_id: 0
•ipmi_sequence: 0
•ipmi_src_address: 32
•ipmi_src_lun: 0
Page 104
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ipmi_tgt_address: 129
•ipmi_tgt_lun: 0
•ipmi_user_anonymous: 0
•ipmi_user_disable_message_auth: 0
•ipmi_user_disable_user_auth: 0
•ipmi_user_kg: 0
•ipmi_user_non_null: 1
•ipmi_user_null: 0
•ipmi_user_reserved1: 0
10.220.251.65
udp
623
3
•ipmi_channel: 1
•ipmi_channel_reserved: 0
•ipmi_checksum: 32
•ipmi_command: 56
•ipmi_compat_20: 1
•ipmi_compat_md2: 0
•ipmi_compat_md5: 0
•ipmi_compat_none: 0
•ipmi_compat_oem_auth: 0
•ipmi_compat_password: 0
•ipmi_compat_reserved1: 0
•ipmi_compat_reserved2: 0
•ipmi_completion_code: 0
•ipmi_conn_15: 1
•ipmi_conn_20: 1
•ipmi_conn_reserved1: 0
•ipmi_header_checksum: 99
•ipmi_netfn: 7
•ipmi_oem_data: 0
•ipmi_oem_id: 0
•ipmi_sequence: 0
•ipmi_src_address: 32
•ipmi_src_lun: 0
•ipmi_tgt_address: 129
•ipmi_tgt_lun: 0
•ipmi_user_anonymous: 0
•ipmi_user_disable_message_auth: 0
•ipmi_user_disable_user_auth: 0
•ipmi_user_kg: 0
•ipmi_user_non_null: 1
Page 105
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ipmi_user_null: 0
•ipmi_user_reserved1: 0
4.3. CIFS
CIFS, the Common Internet File System, was defined by Microsoft to provide file sharing services over the Internet. CIFS extends the
Server Message Block (SMB) protocol designed by IBM and enhanced by Intel and Microsoft. CIFS provides mechanisms for sharing
resources (files, printers, etc.) and executing remote procedure calls over named pipes.
4.3.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.119
tcp
139
2
•Windows Server 2008 R2 Standard
6.1
•domain: WIN-MDJKT3PE7IL
•password-mode: encrypt
•security-mode: user
•smb-signing: disabled
•smb1-enabled: true
10.220.251.119
tcp
445
2
•Windows Server 2008 R2 Standard
6.1
•domain: WIN-MDJKT3PE7IL
•password-mode: encrypt
•security-mode: user
•smb-signing: disabled
•smb1-enabled: true
•smb2-enabled: true
•smb2-signing: enabled
10.220.251.46
tcp
139
0
10.220.251.46
tcp
445
0
•smb2-enabled: true
•smb2-signing: required
4.4. CIFS Name Service
CIFS, the Common Internet File System, was defined by Microsoft to provide file sharing services over the Internet. CIFS extends the
Server Message Block (SMB) protocol designed by IBM and enhanced by Intel and Microsoft. CIFS provides mechanisms for sharing
resources (files, printers, etc.) and executing remote procedure calls over named pipes. This service is used to handle CIFS browsing
(name) requests. Responses contain the names and types of services that can be accessed via CIFS named pipes.
4.4.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.119
udp
137
1
•advertised-name-1: WIN-
Page 106
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
MDJKT3PE7IL (Computer Name)
•advertised-name-2: WORKGROUP
(Domain Name)
•advertised-name-3: WINMDJKT3PE7IL (File Server Service)
•advertised-name-count: 3
•mac-address: FA163E547913
10.220.251.46
udp
137
1
•advertised-name-1: MFS-LHRBACKUP (Computer Name)
•advertised-name-2: MOBILINK
(Domain Name)
•advertised-name-3: MFS-LHRBACKUP (File Server Service)
•advertised-name-count: 3
•mac-address: E0CC7A81A6B7
4.5. DCE Endpoint Resolution
The DCE Endpoint Resolution service, aka Endpoint Mapper, is used on Microsoft Windows systems by Remote Procedure Call (RPC)
clients to determine the appropriate port number to connect to for a particular RPC service. This is similar to the portmapper service
used on Unix systems.
4.5.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.119
tcp
135
0
10.220.251.46
tcp
135
0
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.119
tcp
1025
0
•interface-uuid: D95AFE70-A6D5-
4.6. DCE RPC
4.6.1. Discovered Instances of this Service
4259-822E-2C84DA1DDB0D
•interface-version: 1
•name: D95AFE70-A6D5-4259-822E2C84DA1DDB0D
•object-interface-uuid: 765294BA60BC-48B8-92E9-89FD77769D91
•port.discovered.from: tcp/135
•protocol-sequence:
Page 107
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
ncacn_ip_tcp:10.220.251.119[1025]
10.220.251.119
tcp
1026
0
•interface-uuid: 3C4728C5-F0AB448B-BDA1-6CE01EB0A6D5
•interface-version: 1
•name: DHCP Client LRPC Endpoint
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.119[1026]
10.220.251.119
tcp
1027
0
•interface-uuid: 8C7DAF44-B6DC11D1-9A4C-0020AF6E7C57
•interface-version: 1
•name: 8C7DAF44-B6DC-11D1-9A4C0020AF6E7C57
•object-interface-uuid: 8C7DAF44B6DC-11D1-9A4C-0020AF6E7C57
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.119[1027]
10.220.251.119
tcp
1028
0
•interface-uuid: 367ABB81-9844-35F1AD32-98F038001003
•interface-version: 2
•name: 367ABB81-9844-35F1-AD3298F038001003
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.119[1028]
10.220.251.119
tcp
1029
0
•interface-uuid: 12345678-1234-ABCDEF00-0123456789AB
•interface-version: 1
•name: IPSec Policy agent endpoint
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.119[1029]
10.220.251.119
tcp
1030
0
•interface-uuid: 12345778-1234-ABCDEF00-0123456789AC
•interface-version: 1
•name: 12345778-1234-ABCD-EF000123456789AC
Page 108
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.119[1030]
10.220.251.46
tcp
49664
0
•interface-uuid: D95AFE70-A6D54259-822E-2C84DA1DDB0D
•interface-version: 1
•name: D95AFE70-A6D5-4259-822E2C84DA1DDB0D
•object-interface-uuid: 765294BA60BC-48B8-92E9-89FD77769D91
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.46[49664]
10.220.251.46
tcp
49665
0
•interface-uuid: 30ADC50C-5CBC46CE-9A0E-91914789E23C
•interface-version: 1
•name: NRP server endpoint
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.46[49665]
10.220.251.46
tcp
49666
0
•interface-uuid: D09BDEB5-61714A34-BFE2-06FA82652568
•interface-version: 1
•name: D09BDEB5-6171-4A34-BFE206FA82652568
•object-interface-uuid: 582A47B2BCD8-4D3C-8ACB-FE09D5BD6EEC
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.46[49666]
10.220.251.46
tcp
49667
0
•interface-uuid: 12345778-1234-ABCDEF00-0123456789AC
•interface-version: 1
•name: 12345778-1234-ABCD-EF000123456789AC
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.46[49667]
Page 109
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.46
tcp
49668
0
•interface-uuid: 76F03F96-CDFD44FC-A22C-64950A001209
•interface-version: 1
•name: 76F03F96-CDFD-44FC-A22C64950A001209
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.46[49668]
10.220.251.46
tcp
49686
0
•interface-uuid: 6B5BDD1E-528C422C-AF8C-A4079BE4FE48
•interface-version: 1
•name: Remote Fw APIs
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.46[49686]
10.220.251.46
tcp
49724
0
•interface-uuid: 367ABB81-9844-35F1AD32-98F038001003
•interface-version: 2
•name: 367ABB81-9844-35F1-AD3298F038001003
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.46[49724]
10.220.251.46
tcp
49751
0
•interface-uuid: 12345778-1234-ABCDEF00-0123456789AC
•interface-version: 1
•name: 12345778-1234-ABCD-EF000123456789AC
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:10.220.251.46[49751]
4.7. HTTP
HTTP, the HyperText Transfer Protocol, is used to exchange multimedia content on the World Wide Web. The multimedia files
commonly used with HTTP include text, sound, images and video.
4.7.1. General Security Issues
Simple authentication scheme
Page 110
Audit Report
Many HTTP servers use BASIC as their primary mechanism for user authentication. This is a very simple scheme that uses base 64 to
encode the cleartext user id and password. If a malicious user is in a position to monitor HTTP traffic, user ids and passwords can be
stolen by decoding the base 64 authentication data. To secure the authentication process, use HTTPS (HTTP over TLS/SSL)
connections to transmit the authentication data.
4.7.2. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
10.220.251.24
tcp
80
0
10.220.251.25
tcp
80
0
10.220.251.26
tcp
80
0
10.220.251.27
tcp
80
0
10.220.251.28
tcp
80
0
10.220.251.29
tcp
80
0
10.220.251.30
tcp
80
0
10.220.251.31
tcp
80
0
10.220.251.32
tcp
80
0
10.220.251.46
tcp
80
1
Additional Information
•Commvault WebServer
•http.banner: Commvault WebServer
•http.banner.server: Commvault
WebServer
10.220.251.46
tcp
81
3
•Microsoft IIS 10.0
•.NET CLR:
•ASP.NET:
•http.banner: Microsoft-IIS/10.0
•http.banner.server: Microsoft-IIS/10.0
•http.banner.x-powered-by: ASP.NET
•verbs-1: GET
•verbs-2: HEAD
•verbs-3: OPTIONS
•verbs-4: POST
•verbs-5: TRACE
•verbs-count: 5
10.220.251.46
tcp
82
3
•Microsoft IIS 10.0
•.NET CLR:
•ASP.NET:
•http.banner: Microsoft-IIS/10.0
•http.banner.server: Microsoft-IIS/10.0
•http.banner.x-powered-by: ASP.NET
Page 111
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•verbs-1: GET
•verbs-2: HEAD
•verbs-3: OPTIONS
•verbs-4: POST
•verbs-5: TRACE
•verbs-count: 5
10.220.251.64
tcp
80
0
10.220.251.65
tcp
80
0
10.220.251.82
tcp
80
0
10.220.251.83
tcp
80
0
10.220.251.84
tcp
80
0
4.8. HTTPS
HTTPS, the HyperText Transfer Protocol over TLS/SSL, is used to exchange multimedia content on the World Wide Web using
encrypted (TLS/SSL) connections. Once the TLS/SSL connection is established, the standard HTTP protocol is used. The multimedia
files commonly used with HTTP include text, sound, images and video.
4.8.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.24
tcp
443
4
•jQuery: 3.2.1
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
Page 112
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
Page 113
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.25
tcp
443
4
•jQuery: 3.2.1
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
Page 114
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.26
tcp
443
4
•jQuery: 3.2.1
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
Page 115
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
Page 116
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.27
tcp
443
4
•jQuery: 3.2.1
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
Page 117
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
Page 118
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.28
tcp
443
4
•jQuery: 3.2.1
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
Page 119
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.29
tcp
443
4
•jQuery: 3.2.1
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
Page 120
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
Page 121
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.30
tcp
443
4
•jQuery: 3.2.1
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
Page 122
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
Page 123
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
FORMATS
10.220.251.31
tcp
443
4
•jQuery: 3.2.1
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
Page 124
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.32
tcp
443
4
•jQuery: 3.2.1
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
Page 125
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
Page 126
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.46
tcp
443
5
•Commvault WebServer
•http.banner: Commvault WebServer
•http.banner.server: Commvault
WebServer
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn: CN=COMMVAULT
•ssl.cert.key.alg.name: RSA
•ssl.cert.key.rsa.modulusBits: 2048
•ssl.cert.not.valid.after: Sun, 21 Jun
2020 07:50:45 PKT
•ssl.cert.not.valid.before: Sat, 22 Jun
2019 07:50:45 PKT
•ssl.cert.selfsigned: true
•ssl.cert.serial.number:
1561171845923
•ssl.cert.sha1.fingerprint:
87bda09e2957a3362c3890cf2101b7d
e0884baf9
•ssl.cert.sig.alg.name:
SHA256withRSA
•ssl.cert.subject.dn: CN=COMMVAULT
•ssl.cert.validchain: false
•ssl.cert.validsignature: true
•ssl.cert.version: 1
Page 127
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssl.protocols: tlsv1_0,tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: true
•tlsv1_0.ciphers:
TLS_ECDHE_RSA_WITH_AES_128_
CBC_SHA
•tlsv1_0.extensions:
RENEGOTIATION_INFO
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_RSA_WITH_AES_128_
CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_RSA_WITH_AES_128_
GCM_SHA256,TLS_DHE_RSA_WITH
_AES_128_GCM_SHA256,TLS_ECD
HE_RSA_WITH_AES_128_CBC_SHA
256,TLS_ECDHE_RSA_WITH_AES_
128_CBC_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO
10.220.251.64
tcp
443
3
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn: CN=Huawei IT
Product CA, O=Huawei, C=CN
•ssl.cert.key.alg.name: RSA
•ssl.cert.key.rsa.modulusBits: 2048
•ssl.cert.not.valid.after: Sat, 04 Nov
2028 07:04:51 PKT
•ssl.cert.not.valid.before: Wed, 07 Nov
2018 07:04:51 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
6619165602698291111
Page 128
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssl.cert.sha1.fingerprint:
0dcf33359581c46c37c75939c66fde53
b0eb320f
•ssl.cert.sig.alg.name:
SHA256withRSA
•ssl.cert.subject.dn: CN=huawei,
OU=IT, L=ShenZhen,
ST=GuangDong, O=Huawei, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 3
•ssl.dh.generator.2048: 2
•ssl.dh.prime.2048:
ffffffffffffffffc90fdaa22168c234c4c6628
b80dc1cd129024e088a67cc74020bbe
a63b139b22514a08798e3404ddef951
9b3cd3a431b302b0a6df25f14374fe13
56d6d51c245e485b576625e7ec6f44c
42e9a637ed6b0bff5cb6f406b7edee38
6bfb5a899fa5ae9f24117c4b1fe649286
651ece45b3dc2007cb8a163bf0598da
48361c55d39a69163fa8fd24cf5f83655
d23dca3ad961c62f356208552bb9ed5
29077096966d670c354e4abc9804f17
46c08ca18217c32905e462e36ce3be3
9e772c180e86039b2783a2ec07a28fb
5c55df06f4c52c9de2bcbf6955817183
995497cea956ae515d2261898fa0510
15728e5a8aacaa68ffffffffffffffff
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.TLS_DHE_RSA_WITH_AES_
128_CBC_SHA.dh.keysize: 2048
•tlsv1_1.TLS_DHE_RSA_WITH_AES_
256_CBC_SHA.dh.keysize: 2048
•tlsv1_1.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
CBC_SHA,TLS_DHE_RSA_WITH_AE
Page 129
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
S_256_CBC_SHA,TLS_ECDHE_RSA
_WITH_AES_128_CBC_SHA,TLS_D
HE_RSA_WITH_AES_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
128_CBC_SHA.dh.keysize: 2048
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
128_CBC_SHA256.dh.keysize: 2048
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
128_GCM_SHA256.dh.keysize: 2048
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
256_CBC_SHA.dh.keysize: 2048
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
256_CBC_SHA256.dh.keysize: 2048
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
256_GCM_SHA384.dh.keysize: 2048
•tlsv1_2.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
GCM_SHA384,TLS_ECDHE_RSA_WI
TH_AES_256_CBC_SHA384,TLS_EC
DHE_RSA_WITH_AES_256_CBC_S
HA,TLS_DHE_RSA_WITH_AES_256
_GCM_SHA384,TLS_DHE_RSA_WIT
H_AES_256_CBC_SHA256,TLS_DH
E_RSA_WITH_AES_256_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_
GCM_SHA256,TLS_ECDHE_RSA_WI
TH_AES_128_CBC_SHA256,TLS_EC
DHE_RSA_WITH_AES_128_CBC_S
HA,TLS_DHE_RSA_WITH_AES_128
_GCM_SHA256,TLS_DHE_RSA_WIT
H_AES_128_CBC_SHA256,TLS_DH
E_RSA_WITH_AES_128_CBC_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.65
tcp
443
3
Page 130
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn: CN=Huawei IT
Product CA, O=Huawei, C=CN
•ssl.cert.key.alg.name: RSA
•ssl.cert.key.rsa.modulusBits: 2048
•ssl.cert.not.valid.after: Sat, 04 Nov
2028 07:04:51 PKT
•ssl.cert.not.valid.before: Wed, 07 Nov
2018 07:04:51 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
6619165602698291111
•ssl.cert.sha1.fingerprint:
0dcf33359581c46c37c75939c66fde53
b0eb320f
•ssl.cert.sig.alg.name:
SHA256withRSA
•ssl.cert.subject.dn: CN=huawei,
OU=IT, L=ShenZhen,
ST=GuangDong, O=Huawei, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 3
•ssl.dh.generator.2048: 2
•ssl.dh.prime.2048:
ffffffffffffffffc90fdaa22168c234c4c6628
b80dc1cd129024e088a67cc74020bbe
a63b139b22514a08798e3404ddef951
9b3cd3a431b302b0a6df25f14374fe13
56d6d51c245e485b576625e7ec6f44c
42e9a637ed6b0bff5cb6f406b7edee38
6bfb5a899fa5ae9f24117c4b1fe649286
651ece45b3dc2007cb8a163bf0598da
48361c55d39a69163fa8fd24cf5f83655
d23dca3ad961c62f356208552bb9ed5
29077096966d670c354e4abc9804f17
46c08ca18217c32905e462e36ce3be3
9e772c180e86039b2783a2ec07a28fb
5c55df06f4c52c9de2bcbf6955817183
Page 131
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
995497cea956ae515d2261898fa0510
15728e5a8aacaa68ffffffffffffffff
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.TLS_DHE_RSA_WITH_AES_
128_CBC_SHA.dh.keysize: 2048
•tlsv1_1.TLS_DHE_RSA_WITH_AES_
256_CBC_SHA.dh.keysize: 2048
•tlsv1_1.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
CBC_SHA,TLS_DHE_RSA_WITH_AE
S_256_CBC_SHA,TLS_ECDHE_RSA
_WITH_AES_128_CBC_SHA,TLS_D
HE_RSA_WITH_AES_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
128_CBC_SHA.dh.keysize: 2048
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
128_CBC_SHA256.dh.keysize: 2048
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
128_GCM_SHA256.dh.keysize: 2048
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
256_CBC_SHA.dh.keysize: 2048
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
256_CBC_SHA256.dh.keysize: 2048
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
256_GCM_SHA384.dh.keysize: 2048
•tlsv1_2.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
GCM_SHA384,TLS_ECDHE_RSA_WI
TH_AES_256_CBC_SHA384,TLS_EC
DHE_RSA_WITH_AES_256_CBC_S
HA,TLS_DHE_RSA_WITH_AES_256
_GCM_SHA384,TLS_DHE_RSA_WIT
Page 132
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
H_AES_256_CBC_SHA256,TLS_DH
E_RSA_WITH_AES_256_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_
GCM_SHA256,TLS_ECDHE_RSA_WI
TH_AES_128_CBC_SHA256,TLS_EC
DHE_RSA_WITH_AES_128_CBC_S
HA,TLS_DHE_RSA_WITH_AES_128
_GCM_SHA256,TLS_DHE_RSA_WIT
H_AES_128_CBC_SHA256,TLS_DH
E_RSA_WITH_AES_128_CBC_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.82
tcp
443
3
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
Page 133
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.83
tcp
443
3
•ssl: true
Page 134
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
Page 135
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
10.220.251.84
tcp
443
3
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
ST=Guangdong, C=CN
•ssl.cert.key.alg.name: EC
•ssl.cert.not.valid.after: Mon, 22 May
2028 06:41:18 PKT
•ssl.cert.not.valid.before: Fri, 25 May
2018 06:41:18 PKT
•ssl.cert.selfsigned: false
•ssl.cert.serial.number:
13542711516911359001
•ssl.cert.sha1.fingerprint:
Page 136
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
5ba1dceda72608eccca41b1f421f400e
46d595c3
•ssl.cert.sig.alg.name:
SHA256withECDSA
•ssl.cert.subject.dn:
EMAILADDRESS=support_e@huawei
.com, CN=Huawei, OU=IT, O=Huawei,
L=Shenzhen, ST=Guangdong, C=CN
•ssl.cert.validchain: false
•ssl.cert.version: 1
•ssl.protocols: tlsv1_1,tlsv1_2
•sslv2: false
•sslv3: false
•tlsv1_0: false
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_CBC_SHA,TLS_ECDH_ECDSA_
WITH_AES_256_CBC_SHA,TLS_EC
DHE_ECDSA_WITH_AES_128_CBC
_SHA,TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_ECDSA_WITH_AES_2
56_GCM_SHA384,TLS_ECDHE_ECD
SA_WITH_AES_256_CBC_SHA384,T
LS_ECDHE_ECDSA_WITH_AES_256
_CBC_SHA,TLS_ECDH_ECDSA_WIT
H_AES_256_GCM_SHA384,TLS_EC
DH_ECDSA_WITH_AES_256_CBC_
SHA384,TLS_ECDH_ECDSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_E
CDSA_WITH_AES_128_GCM_SHA2
56,TLS_ECDHE_ECDSA_WITH_AES
_128_CBC_SHA256,TLS_ECDHE_E
CDSA_WITH_AES_128_CBC_SHA,T
Page 137
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
LS_ECDH_ECDSA_WITH_AES_128_
GCM_SHA256,TLS_ECDH_ECDSA_
WITH_AES_128_CBC_SHA256,TLS_
ECDH_ECDSA_WITH_AES_128_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
4.9. Microsoft SQL Monitor
Microsoft SQL Server provides a monitor service used to discover and monitor Microsoft SQL servers. By broadcasting a request to
UDP port 1434, a client can locate systems on the local network running Microsoft SQL Server.
4.9.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.46
udp
1434
1
•Microsoft SQL Server 2014
12.0.5000.0
•InstanceName: COMMVAULT
•IsClustered: No
•ServerName: MFS-LHR-BACKUP
•Version: 12.0.5000.0
•tcp: 50553
4.10. NFS
The Network File System provides remote file access to shared file systems across a network. NFS provides methods to list and
browse directories and to access and alter files. NFS is built on the RPC protocol and is thus independent of machine, operating
systems, or even underlying protocol. The main NFS protocol often operates in tandem with other NFS style protocols. The NFS Mount
protocol deals with attaching the remote file systems to a point on the local machine's file system, and advertising what file systems are
available to be mounted. The NFS Lock manager adds support for file locking to prevent the occurrence of file change conflicts.
4.10.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.46
tcp
2049
0
•port.discovered.from: udp/111
•program-number: 100003
•program-version: 3
10.220.251.47
tcp
2049
0
•port.discovered.from: tcp/111
•program-number: 100003
•program-version: 3
Page 138
Audit Report
4.11. NFS lockd
The Network File System provides remote file access to shared file systems across a network. NFS provides methods to list and
browse directories and to access and alter files. NFS is built on the RPC protocol and is thus independent of machine, operating
systems, or even underlying protocol. This service, NFS Lock manager, adds support for file locking to prevent the occurrence of file
change conflicts. Since the NFS protocol is stateless, the NFS Lock Manager takes care of all the stateful aspects of file locking across
a network
4.11.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.33
tcp
2052
0
•port.discovered.from: udp/111
•program-number: 100021
•program-version: 4
10.220.251.33
udp
2052
0
•port.discovered.from: udp/111
•program-number: 100021
•program-version: 4
10.220.251.34
tcp
2052
0
•port.discovered.from: tcp/111
•program-number: 100021
•program-version: 4
10.220.251.34
udp
2052
0
•port.discovered.from: tcp/111
•program-number: 100021
•program-version: 4
10.220.251.35
tcp
2052
0
•port.discovered.from: tcp/111
•program-number: 100021
•program-version: 4
10.220.251.35
udp
2052
0
•port.discovered.from: tcp/111
•program-number: 100021
•program-version: 4
10.220.251.36
tcp
45332
0
•port.discovered.from: tcp/111
•program-number: 100021
•program-version: 4
10.220.251.36
udp
55217
0
•port.discovered.from: udp/111
•program-number: 100021
•program-version: 4
4.12. NTP
The Network Time Protocol (NTP) is used to keep the clocks of machines on a network synchronized. Provisions are made in the
protocol to account for network disruption and packet latency.
Page 139
Audit Report
4.12.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
10.220.251.10
udp
123
0
10.220.251.100
udp
123
0
10.220.251.101
udp
123
0
10.220.251.102
udp
123
0
10.220.251.103
udp
123
0
10.220.251.104
udp
123
0
10.220.251.105
udp
123
0
10.220.251.106
udp
123
0
10.220.251.107
udp
123
0
10.220.251.108
udp
123
0
10.220.251.109
udp
123
0
10.220.251.11
udp
123
0
10.220.251.110
udp
123
0
10.220.251.111
udp
123
0
10.220.251.112
udp
123
0
10.220.251.113
udp
123
0
10.220.251.114
udp
123
0
10.220.251.115
udp
123
0
10.220.251.116
udp
123
0
10.220.251.117
udp
123
0
10.220.251.118
udp
123
0
10.220.251.12
udp
123
0
10.220.251.121
udp
123
0
10.220.251.122
udp
123
0
10.220.251.13
udp
123
0
10.220.251.14
udp
123
0
10.220.251.15
udp
123
0
10.220.251.16
udp
123
0
10.220.251.17
udp
123
0
10.220.251.18
udp
123
0
10.220.251.21
udp
123
0
Additional Information
Page 140
Audit Report
Device
Protocol
Port
Vulnerabilities
10.220.251.22
udp
123
0
10.220.251.23
udp
123
0
10.220.251.33
udp
123
0
10.220.251.35
udp
123
0
10.220.251.36
udp
123
2
Additional Information
•NTP 4.2.8p12@1.3728-o
•ntp.variables: version="ntpd
4.2.8p12@1.3728-o Wed Oct 17
16:05:35 UTC 2018 (1)",
processor="x86_64",
system="Linux/4.4.21-69-default",
leap=0, stratum=11, precision=-24,
rootdelay=0.000, rootdisp=11.091,
refid=127.127.1.0,
reftime=0xe5427dd0.a6c68bf4,
clock=0xe5427ddc.8af7a060,
peer=28246, tc=6, mintc=3,
offset=0.000000, frequency=0.000,
sys_jitter=0.000000, clk_jitter=0.000,
clk_wander=0.000
10.220.251.37
udp
123
0
10.220.251.38
udp
123
0
10.220.251.39
udp
123
0
10.220.251.41
udp
123
0
10.220.251.48
udp
123
0
10.220.251.49
udp
123
0
10.220.251.50
udp
123
0
10.220.251.51
udp
123
0
10.220.251.52
udp
123
0
10.220.251.53
udp
123
0
10.220.251.54
udp
123
0
10.220.251.56
udp
123
0
10.220.251.57
udp
123
0
10.220.251.59
udp
123
0
10.220.251.60
udp
123
0
10.220.251.61
udp
123
0
Page 141
Audit Report
Device
Protocol
Port
Vulnerabilities
10.220.251.62
udp
123
0
10.220.251.63
udp
123
0
10.220.251.68
udp
123
0
10.220.251.69
udp
123
0
10.220.251.7
udp
123
0
10.220.251.76
udp
123
0
10.220.251.77
udp
123
0
10.220.251.8
udp
123
0
10.220.251.80
udp
123
0
10.220.251.81
udp
123
0
10.220.251.87
udp
123
0
10.220.251.88
udp
123
0
10.220.251.89
udp
123
0
10.220.251.9
udp
123
0
10.220.251.90
udp
123
0
10.220.251.91
udp
123
0
10.220.251.92
udp
123
0
10.220.251.93
udp
123
0
10.220.251.94
udp
123
0
10.220.251.95
udp
123
0
10.220.251.96
udp
123
0
10.220.251.97
udp
123
0
10.220.251.98
udp
123
0
10.220.251.99
udp
123
0
Additional Information
4.13. Oracle TNS Listener
4.13.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.36
tcp
1521
1
•Oracle Database 12.1.0.2
10.220.251.48
tcp
1521
1
•Oracle Database 12.1.0.2
10.220.251.49
tcp
1521
1
•Oracle Database 12.1.0.2
10.220.251.50
tcp
1524
1
•Oracle Database 12.1.0.2
Page 142
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.51
tcp
1521
1
•Oracle Database 12.1.0.2
10.220.251.52
tcp
1521
1
•Oracle Database 12.1.0.2
10.220.251.53
tcp
1524
1
•Oracle Database 12.1.0.2
10.220.251.54
tcp
1521
1
•Oracle Database 12.1.0.2
10.220.251.56
tcp
1524
1
•Oracle Database 12.1.0.2
10.220.251.57
tcp
1521
1
•Oracle Database 12.1.0.2
10.220.251.58
tcp
1521
1
•Oracle Database 12.1.0.2
10.220.251.59
tcp
1524
1
•Oracle Database 12.1.0.2
10.220.251.60
tcp
1521
1
•Oracle Database 12.1.0.2
10.220.251.60
tcp
1524
1
•Oracle Database 12.1.0.2
10.220.251.72
tcp
1521
1
•Oracle Database 12.1.0.2
10.220.251.72
tcp
1524
1
•Oracle Database 12.1.0.2
4.14. RDP
4.14.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.119
tcp
22
5
•Microsoft Terminal Service
•ssl: true
•ssl.protocols: tlsv1_0
•ssl.supportsInsecureRenegotiation:
true
•sslv3: false
•tlsv1_0: true
•tlsv1_0.ciphers:
TLS_RSA_WITH_AES_128_CBC_SH
A,TLS_RSA_WITH_AES_256_CBC_S
HA,TLS_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_3DES_EDE_CBC_
SHA,TLS_ECDHE_RSA_WITH_AES_
128_CBC_SHA,TLS_ECDHE_RSA_
WITH_AES_256_CBC_SHA,TLS_RS
A_WITH_RC4_128_MD5
•tlsv1_0.extensions:
•tlsv1_1: false
Page 143
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•tlsv1_2: false
10.220.251.46
tcp
3389
5
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn: CN=mfs-lhrbackup.mobilink.net.pk
•ssl.cert.key.alg.name: RSA
•ssl.cert.key.rsa.modulusBits: 2048
•ssl.cert.not.valid.after: Wed, 20 Apr
2022 06:02:48 PKT
•ssl.cert.not.valid.before: Tue, 19 Oct
2021 06:02:48 PKT
•ssl.cert.selfsigned: true
•ssl.cert.serial.number:
124356621105865539790604551043
901712689
•ssl.cert.sha1.fingerprint:
4497cfab57e7b3dad13bf3a667b54892
a89a9605
•ssl.cert.sig.alg.name:
SHA256withRSA
•ssl.cert.subject.dn: CN=mfs-lhrbackup.mobilink.net.pk
•ssl.cert.validchain: false
•ssl.cert.validsignature: true
•ssl.cert.version: 3
•ssl.protocols: tlsv1_0,tlsv1_1,tlsv1_2
•sslv3: false
•tlsv1_0: true
•tlsv1_0.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
CBC_SHA,TLS_ECDHE_RSA_WITH_
AES_128_CBC_SHA,TLS_DHE_RSA
_WITH_AES_256_CBC_SHA,TLS_D
HE_RSA_WITH_AES_128_CBC_SHA
,TLS_RSA_WITH_AES_256_CBC_S
HA,TLS_RSA_WITH_AES_128_CBC
_SHA,TLS_RSA_WITH_3DES_EDE_
CBC_SHA
Page 144
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•tlsv1_0.extensions:
RENEGOTIATION_INFO,EXTENDED
_MASTER_SECRET
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
CBC_SHA,TLS_ECDHE_RSA_WITH_
AES_128_CBC_SHA,TLS_DHE_RSA
_WITH_AES_256_CBC_SHA,TLS_D
HE_RSA_WITH_AES_128_CBC_SHA
,TLS_RSA_WITH_AES_256_CBC_S
HA,TLS_RSA_WITH_AES_128_CBC
_SHA,TLS_RSA_WITH_3DES_EDE_
CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EXTENDED
_MASTER_SECRET
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
GCM_SHA384,TLS_ECDHE_RSA_WI
TH_AES_128_GCM_SHA256,TLS_D
HE_RSA_WITH_AES_256_GCM_SH
A384,TLS_DHE_RSA_WITH_AES_12
8_GCM_SHA256,TLS_ECDHE_RSA_
WITH_AES_256_CBC_SHA384,TLS_
ECDHE_RSA_WITH_AES_128_CBC
_SHA256,TLS_ECDHE_RSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_R
SA_WITH_AES_128_CBC_SHA,TLS_
DHE_RSA_WITH_AES_256_CBC_S
HA,TLS_DHE_RSA_WITH_AES_128
_CBC_SHA,TLS_RSA_WITH_AES_2
56_GCM_SHA384,TLS_RSA_WITH_
AES_128_GCM_SHA256,TLS_RSA_
WITH_AES_256_CBC_SHA256,TLS_
RSA_WITH_AES_128_CBC_SHA256,
TLS_RSA_WITH_AES_256_CBC_SH
A,TLS_RSA_WITH_AES_128_CBC_S
HA,TLS_RSA_WITH_3DES_EDE_CB
Page 145
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EXTENDED
_MASTER_SECRET
10.220.251.47
tcp
3389
5
•ssl: true
•ssl.cert.chainerror: [Path does not
chain with any of the trust anchors]
•ssl.cert.issuer.dn: CN=MFS-LHRCV2.mobilink.net.pk
•ssl.cert.key.alg.name: RSA
•ssl.cert.key.rsa.modulusBits: 2048
•ssl.cert.not.valid.after: Mon, 18 Apr
2022 21:40:30 PKT
•ssl.cert.not.valid.before: Sun, 17 Oct
2021 21:40:30 PKT
•ssl.cert.selfsigned: true
•ssl.cert.serial.number:
733124184050264411035793997474
89296830
•ssl.cert.sha1.fingerprint:
ccabd3c94b07aae3442f08a85a58965f
dee688e7
•ssl.cert.sig.alg.name:
SHA256withRSA
•ssl.cert.subject.dn: CN=MFS-LHRCV2.mobilink.net.pk
•ssl.cert.validchain: false
•ssl.cert.validsignature: true
•ssl.cert.version: 3
•ssl.protocols: tlsv1_0,tlsv1_1,tlsv1_2
•sslv3: false
•tlsv1_0: true
•tlsv1_0.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
CBC_SHA,TLS_ECDHE_RSA_WITH_
AES_128_CBC_SHA,TLS_DHE_RSA
_WITH_AES_256_CBC_SHA,TLS_D
HE_RSA_WITH_AES_128_CBC_SHA
,TLS_RSA_WITH_AES_256_CBC_S
Page 146
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
HA,TLS_RSA_WITH_AES_128_CBC
_SHA,TLS_RSA_WITH_3DES_EDE_
CBC_SHA
•tlsv1_0.extensions:
RENEGOTIATION_INFO,EXTENDED
_MASTER_SECRET
•tlsv1_1: true
•tlsv1_1.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
CBC_SHA,TLS_ECDHE_RSA_WITH_
AES_128_CBC_SHA,TLS_DHE_RSA
_WITH_AES_256_CBC_SHA,TLS_D
HE_RSA_WITH_AES_128_CBC_SHA
,TLS_RSA_WITH_AES_256_CBC_S
HA,TLS_RSA_WITH_AES_128_CBC
_SHA,TLS_RSA_WITH_3DES_EDE_
CBC_SHA
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EXTENDED
_MASTER_SECRET
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
GCM_SHA384,TLS_ECDHE_RSA_WI
TH_AES_128_GCM_SHA256,TLS_D
HE_RSA_WITH_AES_256_GCM_SH
A384,TLS_DHE_RSA_WITH_AES_12
8_GCM_SHA256,TLS_ECDHE_RSA_
WITH_AES_256_CBC_SHA384,TLS_
ECDHE_RSA_WITH_AES_128_CBC
_SHA256,TLS_ECDHE_RSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_R
SA_WITH_AES_128_CBC_SHA,TLS_
DHE_RSA_WITH_AES_256_CBC_S
HA,TLS_DHE_RSA_WITH_AES_128
_CBC_SHA,TLS_RSA_WITH_AES_2
56_GCM_SHA384,TLS_RSA_WITH_
AES_128_GCM_SHA256,TLS_RSA_
WITH_AES_256_CBC_SHA256,TLS_
RSA_WITH_AES_128_CBC_SHA256,
Page 147
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
TLS_RSA_WITH_AES_256_CBC_SH
A,TLS_RSA_WITH_AES_128_CBC_S
HA,TLS_RSA_WITH_3DES_EDE_CB
C_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EXTENDED
_MASTER_SECRET
4.15. SNMP
Simple Network Management Protocol (SNMP), like the name implies, is a simple protocol used to manage networking appliances by
remote clients. It is primarily UDP-based and uses trivial authentication by means of a secret community name.
4.15.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.116
udp
161
2
•assignedNumber: 7682
•sysDescr: Linux MFS-LHR-SR1
4.4.12192.98.1.16729.0.PTF.1120260-default
#1 SMP Fri Jan 4 09:06:23 UTC 2019
(fb8f8c4) x86_64
10.220.251.24
udp
161
0
10.220.251.25
udp
161
0
10.220.251.26
udp
161
0
10.220.251.27
udp
161
0
10.220.251.28
udp
161
0
10.220.251.29
udp
161
0
10.220.251.30
udp
161
0
10.220.251.31
udp
161
0
10.220.251.32
udp
161
0
10.220.251.46
udp
161
2
•assignedNumber: 311
•snmp.banner: Hardware: Intel64
Family 6 Model 85 Stepping 4 AT/AT
COMPATIBLE - Software: Windows
Version 6.3 (Build 14393
Multiprocessor Free)
•snmp.name: mfs-lhrbackup.mobilink.net.pk
Page 148
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•snmp.sysObjectID:
1.3.6.1.4.1.311.1.1.3.1.2
•snmp.uptime: 360 days, 10:33:42.65
•snmp.version: v1/v2c
•sysDescr: Hardware: Intel64 Family 6
Model 85 Stepping 4 AT/AT
COMPATIBLE - Software: Windows
Version 6.3 (Build 14393
Multiprocessor Free)
10.220.251.64
udp
161
0
10.220.251.65
udp
161
0
10.220.251.82
udp
161
0
10.220.251.83
udp
161
0
10.220.251.84
udp
161
0
4.16. SSH
SSH, or Secure SHell, is designed to be a replacement for the aging Telnet protocol. It primarily adds encryption and data integrity to
Telnet, but can also provide superior authentication mechanisms such as public key authentication.
4.16.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.10
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
Page 149
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.100
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
Page 150
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.101
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
Page 151
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.102
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.103
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2-
Page 152
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.104
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
Page 153
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.105
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
Page 154
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.106
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
Page 155
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.107
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.108
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
Page 156
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.109
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2-
Page 157
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.11
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
Page 158
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.110
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
Page 159
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.111
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
Page 160
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.protocol.version: 2.0
10.220.251.112
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.113
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsa-
Page 161
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
sha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.114
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellman-
Page 162
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
group14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.115
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
Page 163
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.116
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
Page 164
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.117
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.118
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
Page 165
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ecdsa-sha2nistp256,ssh-ed25519,ssh-rsa,rsasha2-512,rsa-sha2-256
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.12
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519-
Page 166
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.121
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
Page 167
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.122
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
Page 168
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.13
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
Page 169
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.14
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.15
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
Page 170
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.16
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-group-
Page 171
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
exchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.17
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
Page 172
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.18
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
Page 173
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.20
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.21
tcp
22
1
•OpenBSD OpenSSH 7.2
Page 174
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.22
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
Page 175
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.23
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmac-
Page 176
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
sha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.24
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
Page 177
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.25
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
Page 178
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.26
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
Page 179
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.27
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
Page 180
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.28
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
Page 181
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.29
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.30
tcp
22
1
•ssh.algorithms.compression:
Page 182
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.31
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128-
Page 183
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.32
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
Page 184
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.type: ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.33
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmac-
Page 185
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
sha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.34
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
Page 186
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.35
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
Page 187
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.36
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
96:a9:fa:4d:52:83:15:6a:15:45:74:a0:9
6:25:f2:80
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
b0:06:8c:4c:07:d1:e2:67:43:87:41:b5:c
a:02:12:39
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
48:09:94:36:e8:db:55:18:d2:d5:17:cc:0
d:2d:dd:01
Page 188
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
fd:3d:31:ca:96:10:72:e8:59:c1:b9:5b:e
7:cd:86:5f
•ssh.hostkey.type:
DSA,RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.37
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
Page 189
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.38
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.41
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2-
Page 190
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.45
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
Page 191
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.48
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: chacha20poly1305@openssh.com,aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com
•ssh.algorithms.hostkey: sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1-
Page 192
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
cc:ef:50:e6:5d:3e:0b:3b:2f:9e:f4:4d:94:
80:25:7e
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:e4:c4:6d:fe:f4:ff:4a:73:72:88:fc:6f:5
1:60:ea
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
a8:36:11:84:96:f5:e4:f3:d6:16:50:55:f5
:d9:de:7a
•ssh.hostkey.type:
DSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.49
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: chacha20poly1305@openssh.com,aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com
•ssh.algorithms.hostkey: sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256-
Page 193
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
db:e9:f7:e9:81:da:48:31:4d:22:4b:d7:7
c:97:69:2b
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
30:c4:df:fe:ac:c5:93:39:c7:1c:74:d9:9d
:86:7f:b6
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
ff:c1:01:4b:b1:74:fe:7c:21:b9:fd:df:12:7
d:4e:f1
•ssh.hostkey.type:
DSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.50
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: chacha20poly1305@openssh.com,aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com
•ssh.algorithms.hostkey: sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64-
Page 194
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
cc:ef:50:e6:5d:3e:0b:3b:2f:9e:f4:4d:94:
80:25:7e
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:e4:c4:6d:fe:f4:ff:4a:73:72:88:fc:6f:5
1:60:ea
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
a8:36:11:84:96:f5:e4:f3:d6:16:50:55:f5
:d9:de:7a
•ssh.hostkey.type:
DSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.51
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: chacha20poly1305@openssh.com,aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-group-
Page 195
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
exchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
95:c2:3c:bb:cf:6a:eb:e9:01:0c:75:3b:9
c:9a:41:d2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
fc:cf:67:71:0c:89:7a:ec:86:1d:cf:c3:2d:f
8:38:16
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
0c:f4:12:25:b8:91:3f:ca:f9:3f:16:91:73:
0b:14:91
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
8b:61:22:19:3e:06:89:cd:f7:74:b7:fd:f7:
6d:78:e6
•ssh.hostkey.type:
DSA,RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.52
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: chacha20poly1305@openssh.com,aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com
Page 196
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
b3:d3:d3:d2:12:16:7d:0b:03:47:6a:7b:f
6:c7:d0:a4
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
5c:e3:99:77:2a:e3:19:5f:5d:ea:06:b2:e
3:ca:92:57
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
76:58:98:0a:28:a3:97:46:0d:f0:01:d6:f
0:23:c8:3f
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
b9:e2:ff:1b:61:6b:01:4a:d8:a5:ad:f7:6e
:27:0b:12
•ssh.hostkey.type:
DSA,RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.53
tcp
22
0
•OpenBSD OpenSSH 7.2
Page 197
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: chacha20poly1305@openssh.com,aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
b3:d3:d3:d2:12:16:7d:0b:03:47:6a:7b:f
6:c7:d0:a4
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
5c:e3:99:77:2a:e3:19:5f:5d:ea:06:b2:e
3:ca:92:57
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
76:58:98:0a:28:a3:97:46:0d:f0:01:d6:f
0:23:c8:3f
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
Page 198
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
b9:e2:ff:1b:61:6b:01:4a:d8:a5:ad:f7:6e
:27:0b:12
•ssh.hostkey.type:
DSA,RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.54
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: chacha20poly1305@openssh.com,aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
b5:8e:1b:97:9b:59:5d:ca:d9:cd:0a:15:f
8:d8:56:e5
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
fc:f7:2d:02:03:eb:04:ce:6d:d4:c3:cc:33
Page 199
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
:bc:8d:34
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
2f:ea:4f:84:62:74:5d:24:b3:52:3b:19:f8
:0e:5a:e9
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
ac:2d:a1:ce:fb:04:26:36:ed:96:a8:db:4
e:a0:fb:9c
•ssh.hostkey.type:
DSA,RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.56
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: chacha20poly1305@openssh.com,aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
Page 200
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
b5:8e:1b:97:9b:59:5d:ca:d9:cd:0a:15:f
8:d8:56:e5
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
fc:f7:2d:02:03:eb:04:ce:6d:d4:c3:cc:33
:bc:8d:34
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
2f:ea:4f:84:62:74:5d:24:b3:52:3b:19:f8
:0e:5a:e9
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
ac:2d:a1:ce:fb:04:26:36:ed:96:a8:db:4
e:a0:fb:9c
•ssh.hostkey.type:
DSA,RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.57
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ecdsa-sha2nistp256,ssh-ed25519,ssh-rsa,rsasha2-512,rsa-sha2-256
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
cf:b4:88:d8:e2:ae:a8:fd:70:1f:06:83:dc:
Page 201
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
12:6e:24
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
c7:86:2f:14:01:de:75:80:41:e4:60:d7:6
5:2e:7d:97
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e7:55:c4:b8:6d:17:2a:14:e6:f2:bc:3c:fd
:c4:91:47
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.58
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
44:6f:3b:5f:0a:55:f5:92:82:6d:50:03:d2
Page 202
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
:00:60:1c
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
7a:04:c9:74:e0:0d:0a:fa:b2:a1:66:63:3
e:ff:d7:35
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
aa:fb:32:0e:fb:ce:0d:22:d4:89:88:27:2c
:48:0d:43
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
99:00:dc:c4:fd:83:72:01:90:50:0d:cb:a
c:f2:f9:2d
•ssh.hostkey.type:
DSA,RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.59
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ecdsa-sha2nistp256,ssh-ed25519,ssh-rsa,rsasha2-512,rsa-sha2-256
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
cf:b4:88:d8:e2:ae:a8:fd:70:1f:06:83:dc:
12:6e:24
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
Page 203
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
c7:86:2f:14:01:de:75:80:41:e4:60:d7:6
5:2e:7d:97
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e7:55:c4:b8:6d:17:2a:14:e6:f2:bc:3c:fd
:c4:91:47
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.60
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
9b:87:7b:f1:59:18:ff:05:38:65:ee:6f:2c:
68:9c:0b
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
Page 204
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
ca:b4:49:0b:85:f9:b8:d8:63:da:2e:d9:8
4:1e:b5:b1
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
c2:0b:87:32:9d:65:1e:1b:92:c5:26:5f:2
1:29:55:dc
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
c2:8a:ff:1b:15:3e:e8:77:42:a5:c6:3b:22
:37:b6:b0
•ssh.hostkey.type:
DSA,RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.61
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
Page 205
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.62
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.63
tcp
22
0
•OpenBSD OpenSSH 7.2
Page 206
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.64
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellman-
Page 207
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
group-exchange-sha1,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_x.x
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
e5:45:fe:d4:ef:b5:20:3d:6b:19:fb:e9:d0
:f8:2f:92
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
81:95:5d:4a:80:0b:80:47:a2:0b:cf:e6:3
c:f8:f1:30
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
56:eb:10:b6:34:62:37:be:ce:ef:04:0b:1
c:fd:ec:f7
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.65
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup-exchange-sha1,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128-
Page 208
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_x.x
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
99:13:83:3f:67:3e:c9:1b:09:3a:a2:30:2
4:73:d6:9a
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
97:27:0a:8e:38:05:96:6e:dd:f5:62:0a:2
2:40:65:0b
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e5:cb:7e:b2:92:3f:89:2f:e7:90:45:16:e8
:f1:a6:3c
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.66
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
Page 209
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
7a:04:c9:74:e0:0d:0a:fa:b2:a1:66:63:3
e:ff:d7:35
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
aa:fb:32:0e:fb:ce:0d:22:d4:89:88:27:2c
:48:0d:43
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
99:00:dc:c4:fd:83:72:01:90:50:0d:cb:a
c:f2:f9:2d
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.67
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
7a:04:c9:74:e0:0d:0a:fa:b2:a1:66:63:3
e:ff:d7:35
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
Page 210
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
aa:fb:32:0e:fb:ce:0d:22:d4:89:88:27:2c
:48:0d:43
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
99:00:dc:c4:fd:83:72:01:90:50:0d:cb:a
c:f2:f9:2d
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.68
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
Page 211
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.69
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.7
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
Page 212
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.72
tcp
22
1
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes256-cbc
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,sshdss,ecdsa-sha2-nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-group-
Page 213
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
exchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: umac-64etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-256etm@openssh.com,hmac-sha2-512etm@openssh.com,hmac-sha1etm@openssh.com,umac64@openssh.com,umac128@openssh.com,hmac-sha2256,hmac-sha2-512,hmac-sha1
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.dsa.bits: 1024
•ssh.hostkey.dsa.fingerprint:
9b:87:7b:f1:59:18:ff:05:38:65:ee:6f:2c:
68:9c:0b
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
ca:b4:49:0b:85:f9:b8:d8:63:da:2e:d9:8
4:1e:b5:b1
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
c2:0b:87:32:9d:65:1e:1b:92:c5:26:5f:2
1:29:55:dc
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
c2:8a:ff:1b:15:3e:e8:77:42:a5:c6:3b:22
:37:b6:b0
•ssh.hostkey.type:
DSA,RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.76
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
Page 214
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.77
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmac-
Page 215
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
sha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.78
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
Page 216
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.79
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
Page 217
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.8
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.80
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128-
Page 218
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.81
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdh-
Page 219
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
sha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.82
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
Page 220
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.83
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-
Page 221
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.84
tcp
22
1
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr,aes128gcm@openssh.com,aes256gcm@openssh.com,chacha20poly1305@openssh.com
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: diffie-hellmangroup1-sha1,diffie-hellman-group14sha1,diffie-hellman-group-exchangesha1,diffie-hellman-group-exchangesha256,ecdh-sha2-nistp256,ecdhsha2-nistp384,ecdh-sha2nistp521,curve25519sha256@libssh.org
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
c2:44:b7:63:ec:23:22:79:5c:e3:a5:f0:a
Page 222
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
0:61:f4:4e
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
d8:0f:92:23:7d:36:c5:a1:e0:8e:20:af:e9
:3a:9d:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
e8:b8:93:93:28:ea:93:88:04:a1:3f:98:0
e:ae:89:93
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.87
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ecdsa-sha2nistp256,ssh-ed25519,ssh-rsa,rsasha2-512,rsa-sha2-256
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
Page 223
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.88
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.89
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
Page 224
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.9
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519-
Page 225
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.90
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
Page 226
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.91
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
Page 227
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.92
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
Page 228
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.93
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.94
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
Page 229
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.95
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-group-
Page 230
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
exchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.96
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
Page 231
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.97
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
Page 232
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.98
tcp
22
0
•OpenBSD OpenSSH 7.2
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
10.220.251.99
tcp
22
0
•OpenBSD OpenSSH 7.2
Page 233
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•ssh.algorithms.compression:
none,zlib@openssh.com
•ssh.algorithms.encryption: aes128ctr,aes192-ctr,aes256-ctr
•ssh.algorithms.hostkey: ssh-rsa,rsasha2-512,rsa-sha2-256,ecdsa-sha2nistp256,ssh-ed25519
•ssh.algorithms.kex: curve25519sha256@libssh.org,ecdh-sha2nistp256,ecdh-sha2-nistp384,ecdhsha2-nistp521,diffie-hellman-groupexchange-sha256,diffie-hellmangroup14-sha1
•ssh.algorithms.mac: hmac-sha1,hmacsha2-256,hmac-sha2-512
•ssh.banner: SSH-2.0-OpenSSH_7.2
•ssh.hostkey.ecdsa.bits: 256
•ssh.hostkey.ecdsa.fingerprint:
02:9d:59:e2:3a:f8:3d:35:41:d3:ca:13:6
2:cf:86:f2
•ssh.hostkey.ed25519.bits: 256
•ssh.hostkey.ed25519.fingerprint:
80:fa:5f:84:17:16:12:03:83:5a:4d:69:1
e:70:7c:18
•ssh.hostkey.rsa.bits: 2048
•ssh.hostkey.rsa.fingerprint:
90:09:1b:72:9e:ee:4b:b8:40:b6:29:0a:
85:e6:9f:a1
•ssh.hostkey.type:
RSA,ECDSA,ED25519
•ssh.protocol.version: 2.0
4.17. UPnP-HTTPU
UPnP, Universal Plug and Play, was designed to provide peer to peer networking of intelligent appliances, wireless devices, personal
computers, etc. UPnP compliant devices use HTTP, the HyperText Transfer Protocol, to advertise their services and provide
information to peers. This service is used to receive broadcasts, such as service advertisements from peer UPnP devices.
4.17.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.64
udp
1900
1
•upnp.headers.server: UPnP/2.0
Page 234
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
iBMC/3.43 ProductName/2288H V5
SN/2102351TGT10K6000005
•upnp.headers.usn: uuid:7A81A6B3E0CC-B7CF-E911CD9402A5735B::urn:dmtforg:service:redfish-rest:1
10.220.251.65
udp
1900
1
•upnp.headers.server: UPnP/2.0
iBMC/3.43 ProductName/2288H V5
SN/2102351TGT10K6000007
•upnp.headers.usn: uuid:8DBAA60E04FE-98CE-E91141951E736D6C::urn:dmtforg:service:redfish-rest:1
4.18. Xwindows
X Windows is the graphical desktop shell for UNIX environments. It inherently provides functionality to allow remote clients to run local
applications.
4.18.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.119
tcp
6000
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.119
tcp
6001
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.119
tcp
6002
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.119
tcp
6003
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.119
tcp
6004
0
•sslv3: false
•tlsv1_0: false
Page 235
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•tlsv1_1: false
•tlsv1_2: false
10.220.251.119
tcp
6005
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.119
tcp
6006
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.119
tcp
6007
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.119
tcp
6008
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
10.220.251.119
tcp
6009
0
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
4.19. echo
A server providing the echo service returns all data it receives back to the originating source. Its primary use is for debugging and
measurement.
4.19.1. General Security Issues
Diagnostics Denial-of-Service Attacks
Many implementations of diagnostics services (like echo, chargen, daytime, and discard) are vulnerable to denial-of-service attacks
which flood the service with diagnostics requests, causing the device to spend all its CPU power processing these requests (instead of
doing what it should be doing). One common attack against the echo service involves spoofing echo requests so that the device sends
echo replies back its own echo service, causing an infinite loop which uses up bandwidth and CPU. This can also be achieved by
tricking the chargen service to spam bytes at the echo service, and so on. For more information on the Echo UDP Looping vulnerability,
see the paper by Peter Shipley entitled "TCP/IP Weaknesses and Vulnerabilities": http://www.dis.org/filez/vun-1s.pdf Many Cisco
devices come with these diagnostics services enabled by default. For more information on how Cisco to protect Cisco devices from
diagnostics DoS attacks, see the following white paper: http://www.cisco.com/warp/public/707/3.html Diagnostics services should
always be blocked at the firewall. In addition, if you don't use the diagnostic services, you should disable them.
Page 236
Audit Report
4.19.2. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
10.220.251.52
udp
7
0
10.220.251.77
udp
7
0
10.220.251.81
udp
7
0
Additional Information
4.20. fics (Free Internet Chess Server)
4.20.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.36
tcp
5000
2
•ssl: true
•ssl.protocols: tlsv1_2
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_RSA_WITH_AES_128_CBC_SH
A256
•tlsv1_2.extensions:
RENEGOTIATION_INFO
10.220.251.48
tcp
5000
2
•ssl: true
•ssl.protocols: tlsv1_2
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_RSA_WITH_AES_128_CBC_SH
A256
•tlsv1_2.extensions:
RENEGOTIATION_INFO
10.220.251.49
tcp
5000
2
•ssl: true
•ssl.protocols: tlsv1_2
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: true
Page 237
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•tlsv1_2.ciphers:
TLS_RSA_WITH_AES_128_CBC_SH
A256
•tlsv1_2.extensions:
RENEGOTIATION_INFO
10.220.251.51
tcp
5000
2
•ssl: true
•ssl.protocols: tlsv1_2
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_RSA_WITH_AES_128_CBC_SH
A256
•tlsv1_2.extensions:
RENEGOTIATION_INFO
10.220.251.52
tcp
5000
2
•ssl: true
•ssl.protocols: tlsv1_2
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_RSA_WITH_AES_128_CBC_SH
A256
•tlsv1_2.extensions:
RENEGOTIATION_INFO
10.220.251.54
tcp
5000
2
•ssl: true
•ssl.protocols: tlsv1_2
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: true
•tlsv1_2.ciphers:
TLS_RSA_WITH_AES_128_CBC_SH
A256
•tlsv1_2.extensions:
RENEGOTIATION_INFO
Page 238
Audit Report
4.21. mongodb
4.21.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
10.220.251.46
tcp
27017
0
Additional Information
4.22. mountd
4.22.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.36
udp
14381
0
•port.discovered.from: udp/111
•program-number: 100005
•program-version: 3
10.220.251.36
tcp
14381
0
•port.discovered.from: tcp/111
•program-number: 100005
•program-version: 3
10.220.251.46
tcp
49671
0
•port.discovered.from: udp/111
•program-number: 100005
•program-version: 3
10.220.251.46
tcp
49674
0
•port.discovered.from: udp/111
•program-number: 100005
•program-version: 2
10.220.251.46
tcp
49675
0
•port.discovered.from: udp/111
•program-number: 100005
•program-version: 1
10.220.251.47
tcp
60506
0
•port.discovered.from: udp/111
•program-number: 100005
•program-version: 3
10.220.251.47
tcp
60507
0
•port.discovered.from: udp/111
•program-number: 100005
•program-version: 2
10.220.251.47
tcp
60508
0
•port.discovered.from: udp/111
•program-number: 100005
•program-version: 1
4.23. nfs_acl
Page 239
Audit Report
4.23.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.36
tcp
2049
0
•port.discovered.from: tcp/111
•program-number: 100227
•program-version: 3
10.220.251.36
udp
2049
0
•port.discovered.from: udp/111
•program-number: 100227
•program-version: 3
4.24. portmapper
The Remote Procedure Call portmapper is a service that maps RPC programs to specific ports, and provides that information to client
programs. Since most RPC programs do not have a well defined port number, they are dynamically allocated a port number when they
are first run. Any client program that wishes to use a particular RPC program first contacts the portmapper to determine the port and
protocol of the specified RPC program. The client then uses that information to contact the RPC program directly. In addition some
implementations of the portmapper allow tunneling commands to RPC programs through the portmapper.
4.24.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.33
tcp
111
0
•port.discovered.from: udp/111
•program-number: 100000
•program-version: 2
10.220.251.33
udp
111
0
•port.discovered.from: udp/111
•program-number: 100000
•program-version: 2
10.220.251.34
tcp
111
0
•port.discovered.from: udp/111
•program-number: 100000
•program-version: 2
10.220.251.34
udp
111
0
•port.discovered.from: tcp/111
•program-number: 100000
•program-version: 2
10.220.251.35
tcp
111
0
•port.discovered.from: udp/111
•program-number: 100000
•program-version: 2
10.220.251.35
udp
111
0
•port.discovered.from: tcp/111
•program-number: 100000
•program-version: 2
10.220.251.36
tcp
111
0
•port.discovered.from: tcp/111
Page 240
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
•program-number: 100000
•program-version: 2
10.220.251.36
udp
111
0
•port.discovered.from: udp/111
•program-number: 100000
•program-version: 2
10.220.251.46
tcp
111
0
10.220.251.46
udp
111
0
10.220.251.47
tcp
111
0
10.220.251.47
udp
111
0
4.25. status
4.25.1. Discovered Instances of this Service
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.33
tcp
14380
0
•port.discovered.from: tcp/111
•program-number: 100024
•program-version: 1
10.220.251.33
udp
14380
0
•port.discovered.from: udp/111
•program-number: 100024
•program-version: 1
10.220.251.34
tcp
14380
0
•port.discovered.from: tcp/111
•program-number: 100024
•program-version: 1
10.220.251.34
udp
14380
0
•port.discovered.from: tcp/111
•program-number: 100024
•program-version: 1
10.220.251.35
tcp
14380
0
•port.discovered.from: tcp/111
•program-number: 100024
•program-version: 1
10.220.251.35
udp
14380
0
•port.discovered.from: udp/111
•program-number: 100024
•program-version: 1
10.220.251.36
udp
14380
0
•port.discovered.from: udp/111
•program-number: 100024
•program-version: 1
Page 241
Audit Report
Device
Protocol
Port
Vulnerabilities
Additional Information
10.220.251.36
tcp
14380
0
•port.discovered.from: tcp/111
•program-number: 100024
•program-version: 1
Page 242
Audit Report
5. Discovered Users and Groups
No user or group information was discovered during the scan.
Page 243
Audit Report
6. Discovered Databases
No database information was discovered during the scan.
Page 244
Audit Report
7. Discovered Files and Directories
No file or directory information was discovered during the scan.
Page 245
Audit Report
8. Policy Evaluations
No policy evaluations were performed.
Page 246
Audit Report
9. Spidered Web Sites
9.1. http://10.220.251.24:80
9.1.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.1.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•login.html
•<script>xss<
•script>
9.1.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.2. http://10.220.251.25:80
9.2.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.2.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Page 247
Audit Report
Redirect (302)
•login.html
•<script>xss<
•script>
9.2.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.3. http://10.220.251.26:80
9.3.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.3.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•login.html
•<script>xss<
•script>
9.3.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.4. http://10.220.251.27:80
9.4.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
Page 248
Audit Report
9.4.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•login.html
•<script>xss<
•script>
9.4.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.5. http://10.220.251.28:80
9.5.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.5.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•login.html
•<script>xss<
•script>
9.5.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.6. http://10.220.251.29:80
Page 249
Audit Report
9.6.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.6.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•login.html
•<script>xss<
•script>
9.6.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.7. http://10.220.251.30:80
9.7.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.7.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•login.html
•<script>xss<
•script>
Page 250
Audit Report
9.7.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.8. http://10.220.251.31:80
9.8.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.8.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•login.html
•<script>xss<
•script>
9.8.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.9. http://10.220.251.32:80
9.9.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.9.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Page 251
Audit Report
Redirect (302)
•login.html
•<script>xss<
•script>
9.9.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.10. http://10.220.251.46:80
9.10.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Access Error (403)
•manager
Redirect (302)
•adminconsole
9.10.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•manager
•ADw-script AD4-alert(42) ADw•script AD4-
Error (400)
•"<script>TestScriptValueHere<
•script>"
•<script>xss<
•%23script>.asp%23
•%23script>.aspx%23
•%23script>.jsp%23
•%23script>.php%23
•script>.CGI
•script>.FCGI
•script>.PHP
•script>.PHP3
•script>.PHP4
Page 252
Audit Report
•script>.PHP5
•script>.PHTML
•script>.PL
•script>.PY
•script>.RB
•script>.SH
•script>.SHTML
•script>.asp
•script>.asp%2E
•script>.asp%3f.jsp
•script>.asp%81
•script>.asp+htr
•script>.asp.
•script>.asp.bak
•script>.asp.old
•script>.asp.tmp
•script>.asp
•script>
•script>.asp::$DATA
•script>.aspx
•script>.aspx%3f.jsp
•script>.aspx+htr
•script>.aspx.bak
•script>.aspx.old
•script>.aspx.tmp
•script>.aspx
•script>
•script>.aspx~
•script>.asp~
•script>.jsp
•script>.jsp%00
•script>.jsp%5C
•script>.jsp.bak
•script>.jsp.old
•script>.jsp.tmp
•script>.jsp~
•script>.php
•script>.php.
•script>.php.bak
•script>.php.old
Page 253
Audit Report
•script>.php.tmp
•script>.php
•script>
•script>.php~
•script>.py
•script>.py.
•script>.rb
•script>.rb.
•script>.shtml
•script>.shtml.
•script>.shtml
•script>
•script>.asp%20&CiRestriction=none&CiHiliteType=Full
•script>.asp&CiRestriction=%22<script>TestScriptValueHere<
•script>%22
•script>.asp&CiRestriction=none&CiHiliteType=Full
•script>.aspx%20&CiRestriction=none&CiHiliteType=Full
•script>.aspx&CiRestriction=%22<script>TestScriptValueHere<
•script>%22
•script>.aspx&CiRestriction=none&CiHiliteType=Full
•null.htw?CiWebHitsFile=
Redirect (302)
•adminconsole
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
9.10.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (301)
•adminconsole
•wcSSO.do
Redirect (302)
•webconsole
Successful (200)
9.11. http://10.220.251.46:81
Page 254
Audit Report
9.11.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (301)
•aspnet_client
•system_web
9.11.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•Trace.axd
•aspnet_client
•system_web
•Trace.axd
Error (400)
•"<script>TestScriptValueHere<
•script>"
•<script>xss<
•script>.asp
•script>.asp
•script>
•script>.aspx
•script>.aspx
•script>
•script>.jsp
•script>.php
•script>.php
•script>
•script>.py
•script>.rb
•script>.shtml
•script>.shtml
•script>
9.11.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•aspnet_client
•system_web
Page 255
Audit Report
Successful (200)
9.12. http://10.220.251.46:82
9.12.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (301)
•aspnet_client
•system_web
9.12.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•Trace.axd
•aspnet_client
•system_web
•Trace.axd
Error (400)
•"<script>TestScriptValueHere<
•script>"
•<script>xss<
•script>.asp
•script>.asp
•script>
•script>.aspx
•script>.aspx
•script>
•script>.jsp
•script>.php
•script>.php
•script>
•script>.py
•script>.rb
•script>.shtml
•script>.shtml
•script>
9.12.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Page 256
Audit Report
Access Error (403)
•aspnet_client
•system_web
Successful (200)
9.13. http://10.220.251.64:80
9.13.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.13.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Redirect (302)
•login.html
•<script>xss<
•script>
9.13.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.14. http://10.220.251.65:80
9.14.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.14.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Redirect (302)
•login.html
•<script>xss<
•script>
Page 257
Audit Report
9.14.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.15. http://10.220.251.82:80
9.15.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.15.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•login.html
•<script>xss<
•script>
9.15.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.16. http://10.220.251.83:80
9.16.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.16.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Page 258
Audit Report
Redirect (302)
•login.html
•<script>xss<
•script>
9.16.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.17. http://10.220.251.84:80
9.17.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Redirect (302)
•login.html
9.17.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•login.html
•<script>xss<
•script>
9.17.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
9.18. https://10.220.251.24:443
9.18.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
Page 259
Audit Report
9.18.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
•index.html
•login.html
Successful (200)
•error.html?type=3
9.18.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
Page 260
Audit Report
•login.css
•js
•jquery-3.2.1.min.js
•jquery-migrate-1.4.1.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
9.19. https://10.220.251.25:443
9.19.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.19.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
Page 261
Audit Report
•index.html
•login.html
Successful (200)
•error.html?type=3
9.19.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-3.2.1.min.js
•jquery-migrate-1.4.1.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
9.20. https://10.220.251.26:443
9.20.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.20.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•loginhandler.php.bak
Page 262
Audit Report
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
•index.html
•login.html
Successful (200)
•error.html?type=3
9.20.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-3.2.1.min.js
•jquery-migrate-1.4.1.min.js
•l10n.js
Page 263
Audit Report
•main.js
•messagebox.js
•popbox2.js
9.21. https://10.220.251.27:443
9.21.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.21.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
•index.html
•login.html
Successful (200)
•error.html?type=3
Page 264
Audit Report
9.21.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-3.2.1.min.js
•jquery-migrate-1.4.1.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
9.22. https://10.220.251.28:443
9.22.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.22.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Page 265
Audit Report
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
•index.html
•login.html
Successful (200)
•error.html?type=3
9.22.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-3.2.1.min.js
•jquery-migrate-1.4.1.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
9.23. https://10.220.251.29:443
Page 266
Audit Report
9.23.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.23.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
•index.html
•login.html
Successful (200)
•error.html?type=3
9.23.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
Page 267
Audit Report
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-3.2.1.min.js
•jquery-migrate-1.4.1.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
9.24. https://10.220.251.30:443
9.24.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.24.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
Page 268
Audit Report
•script>
•script>
•script>
•error.html
•index.html
•login.html
Successful (200)
•error.html?type=3
9.24.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-3.2.1.min.js
•jquery-migrate-1.4.1.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
9.25. https://10.220.251.31:443
9.25.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.25.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Page 269
Audit Report
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
•index.html
•login.html
Successful (200)
•error.html?type=3
9.25.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-3.2.1.min.js
Page 270
Audit Report
•jquery-migrate-1.4.1.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
9.26. https://10.220.251.32:443
9.26.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.26.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
•index.html
•login.html
Page 271
Audit Report
Successful (200)
•error.html?type=3
9.26.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-3.2.1.min.js
•jquery-migrate-1.4.1.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
9.27. https://10.220.251.46:443
9.27.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Access Error (403)
•manager
9.27.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•manager
•ADw-script AD4-alert(42) ADw•script AD4-
Error (400)
Page 272
Audit Report
•"<script>TestScriptValueHere<
•script>"
•<script>xss<
•%23script>.asp%23
•%23script>.aspx%23
•%23script>.jsp%23
•%23script>.php%23
•script>.CGI
•script>.FCGI
•script>.PHP
•script>.PHP3
•script>.PHP4
•script>.PHP5
•script>.PHTML
•script>.PL
•script>.PY
•script>.RB
•script>.SH
•script>.SHTML
•script>.asp
•script>.asp%2E
•script>.asp%3f.jsp
•script>.asp%81
•script>.asp+htr
•script>.asp.
•script>.asp.bak
•script>.asp.old
•script>.asp.tmp
•script>.asp
•script>
•script>.asp::$DATA
•script>.aspx
•script>.aspx%3f.jsp
•script>.aspx+htr
•script>.aspx.bak
•script>.aspx.old
•script>.aspx.tmp
•script>.aspx
•script>
•script>.aspx~
Page 273
Audit Report
•script>.asp~
•script>.jsp
•script>.jsp%00
•script>.jsp%5C
•script>.jsp.bak
•script>.jsp.old
•script>.jsp.tmp
•script>.jsp~
•script>.php
•script>.php.
•script>.php.bak
•script>.php.old
•script>.php.tmp
•script>.php
•script>
•script>.php~
•script>.py
•script>.py.
•script>.rb
•script>.rb.
•script>.shtml
•script>.shtml.
•script>.shtml
•script>
•script>.asp%20&CiRestriction=none&CiHiliteType=Full
•script>.asp&CiRestriction=%22<script>TestScriptValueHere<
•script>%22
•script>.asp&CiRestriction=none&CiHiliteType=Full
•script>.aspx%20&CiRestriction=none&CiHiliteType=Full
•script>.aspx&CiRestriction=%22<script>TestScriptValueHere<
•script>%22
•script>.aspx&CiRestriction=none&CiHiliteType=Full
•Chrome
•(
•d+)
•),c=navigator.userAgent.match(
•Edge
•);b(c||!a||parseInt(a[1],10)
•all|left
•.test(P)&&L==0?c?t:r:
Page 274
Audit Report
•all|right
•.test(P)&&L==0?c?r:t:
•canvas|textarea|input|select|button|img
•i)&&(this.element.wrap(a(
•document
•.test(h)||h==document)e.containerOffset={left:0,top:0},e.containerPosition={left:0,top:0},e.parentData={element:a(document),left:0,top:
0,width:a(document).width(),height:a(document).height()||document.body.parentNode.scrollHeight};else{var
•getIDPSSORedirectUrl.do?username
•x3d
•h{1,2}
•ig,
•input|select|textarea|button|object
•.test(e)?!b.disabled:
•login
•index.jsp$
•)||(loc.match(
•login$
•)||loc.match(
•logout.jsp$
•$
•)));console.debug(
•forgotPassword.jsp%00
•forgotPassword.jsp%5C
•index.jsp%00
•index.jsp%5C
•registerRegular.jsp%00
•registerRegular.jsp%5C
•l{1}
•ig,
•m{1,2}
•ig,
•null.htw?CiWebHitsFile=
•right|left
•.test(a)){var
•s{1,2}
•ig,
•textarea|input|select|button
•i)){var
•t{1,2}
•ig,
Page 275
Audit Report
•ui-resizable-(se|sw|ne|nw|n|e|s|w)
•i);b.axis=a&&a[1]?a[1]:
•webconsole
•z{1}
•ig,
Redirect (302)
•webconsole
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4•index.jsp
Successful (200)
•webconsole
•common
•behavior.jsp
•css
•IE8Styles.css?1606211146263
•reportsNav.css?1606211146263
•login
•js
•legalNotice.do
•reports
•responsive
9.27.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
•webconsole
Successful (200)
•webconsole
•applications
•css
•apps.css?1606211146263
•custom-cb.css?1606211146263
•cvdialog.css?1606211146263
•headerstyles.css?1606211146263
•jquery-ui-timepicker-addon.css?1606211146263
•jquery.loadmask.css?1606211146263
Page 276
Audit Report
•notificationHistory.css?1606211146263
•sprites.css?1606211146263
•template-bootstrap.css?1606211146263
•templatestyles.css?1606211146263
•theme
•jquery-ui.css?1606211146263
•ui.notify.css?1606211146263
•bareFrameModeCss.do?1606211146263
•clientLoggingJs.do?1606211146263
•common
•bootstrap
•fonts
•glyphicons-filetypes-regular.eot
•glyphicons-filetypes-regular.svg
•glyphicons-filetypes-regular.ttf
•glyphicons-filetypes-regular.woff
•glyphicons-filetypes-regular.woff2
•glyphicons-halflings-regular.eot
•glyphicons-halflings-regular.svg
•glyphicons-halflings-regular.ttf
•glyphicons-halflings-regular.woff
•glyphicons-halflings-regular.woff2
•glyphicons-regular.eot
•glyphicons-regular.svg
•glyphicons-regular.ttf
•glyphicons-regular.woff
•glyphicons-regular.woff2
•glyphicons-halflings-regular.eot
•glyphicons-halflings-regular.svg
•glyphicons-halflings-regular.ttf
•glyphicons-halflings-regular.woff
•glyphicons-halflings-regular.woff2
•javascripts
•bootstrap.min.js?1606211146263
•csspie
•PIE.htc
•customTheme.do?1606211146263
•js
•custom-cb.js?1606211146263
•custom-modal.js?1606211146263
Page 277
Audit Report
•cvutil.js?1606211146263
•dateformatter.js?1606211146263
•encoder.js?1606211146263
•hashMap.js?1606211146263
•jquery-migrate-1.2.1.js?1606211146263
•jquery-ui-min.js?1606211146263
•jquery-ui-timepicker-addon.js?1606211146263
•jquery.cookie.js?1606211146263
•jquery.loadmask.min.js?1606211146263
•jquery.min.js?1606211146263
•jquery.notify.js?1606211146263
•localforage.min.js?1606211146263
•logUtil.js?1606211146263
•mustache.js?1606211146263
•notificationHistory.js?1606211146263
•pollTaskHandler.js?1606211146263
•forgotPassword.js?1606211146263
•login.js?1606211146263
•register.js?1606211146263
•thirdParty
•glyphicons
•glyphicons-filetypes.css?1606211146263
•glyphicons-halflings.css?1606211146263
•glyphicons.css?1606211146263
•devModeCss.do?1606211146263
•devModeJs.do?1606211146263
•getCaptcha.do
•login
•forgotPassword.jsp
•index.jsp
•registerRegular.jsp
•settings
•settings.css?1606211146263
9.28. https://10.220.251.64:443
9.28.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
Page 278
Audit Report
9.28.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•index.php.bak
•index.php.tmp
•index.php~
Redirect (301)
•bmc
•resources
•i18n
•js
•widget
•i18n
•js
•tiny-common
•tiny-directives
•tiny-lib
•tiny-widgets
Redirect (302)
•index.php
•<script>xss<
•script>
Successful (200)
•login.html
•<script>xss<
•script>
9.28.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
•index.php
Successful (200)
•bmc
•resources
•css
•cmn.css?resource_id=15585350952019
Page 279
Audit Report
•frame.css?resource_id=15585350952019
•jquery-ui.css?resource_id=15585350952019
•i18n
•en_ibmclanguageset.js?resource_id=15585350952019
•versionInfo.js?resource_id=15585350952019
•js
•module-config.js?resource_id=15585350952019
•tiny-lib
•require.js?resource_id=15585350952019
•widget
9.29. https://10.220.251.65:443
9.29.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.29.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•index.php.bak
•index.php.tmp
•index.php~
Redirect (301)
•bmc
•resources
•i18n
•js
•widget
•i18n
•js
•tiny-common
•tiny-directives
•tiny-lib
•tiny-widgets
Page 280
Audit Report
Redirect (302)
•index.php
•<script>xss<
•script>
Successful (200)
•login.html
•<script>xss<
•script>
9.29.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Redirect (302)
•index.php
Successful (200)
•bmc
•resources
•css
•cmn.css?resource_id=15585350952019
•frame.css?resource_id=15585350952019
•jquery-ui.css?resource_id=15585350952019
•i18n
•en_ibmclanguageset.js?resource_id=15585350952019
•versionInfo.js?resource_id=15585350952019
•js
•module-config.js?resource_id=15585350952019
•tiny-lib
•require.js?resource_id=15585350952019
•widget
9.30. https://10.220.251.82:443
9.30.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.30.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Page 281
Audit Report
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
•index.html
•login.html
Successful (200)
•error.html?type=3
9.30.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-migrate-1.4.1.min.js
Page 282
Audit Report
•jquery.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
9.31. https://10.220.251.83:443
9.31.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.31.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
•index.html
•login.html
Page 283
Audit Report
Successful (200)
•error.html?type=3
9.31.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-migrate-1.4.1.min.js
•jquery.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
9.32. https://10.220.251.84:443
9.32.1. Common Default URLs
The following URLs were guessed. They are often included with default web server or web server add-on installations.
Successful (200)
•login.html
9.32.2. Guessed URLs
The following URLs were guessed using various tricks based on the discovered web site content.
Access Error (403)
•index.bak
•loginhandler.php.bak
•loginhandler.php.tmp
•loginhandler.php
•<script>xss<
•script>
Page 284
Audit Report
•loginhandler.php~
Error (400)
•?P=+ADw-script+AD4-alert(42)+ADw•script+AD4-
Redirect (302)
•check_first_login.html
•<script>xss<
•script>
•script>
•script>
•script>
•error.html
•index.html
•login.html
Successful (200)
•error.html?type=3
9.32.3. Linked URLs
The following URLs were found as links in the content of other web pages.
Access Error (403)
•loginhandler.php
Redirect (302)
•check_first_login.html?chassisid=0
•index.html?chassisid=0
Successful (200)
•css
•en_css.css
•login.css
•js
•jquery-migrate-1.4.1.min.js
•jquery.min.js
•l10n.js
•main.js
•messagebox.js
•popbox2.js
Page 285
Download