Tenable
Tenable
ia
nt
se
Scan Metasploitable 2 - Vulnérabilités
Es
Report generated by Tenable Nessus™ Wed, 18 Dec 2024 05:17:16 Romance Standard Time
us
ss
Ne
TABLE OF CONTENTS
Vulnerabilities by Host
• 192.168.238.136.........................................................................................................................................................4
ls
ia
nt
se
Es
us
ss
Ne
ls
ia
nt
se
Vulnerabilities by Host
Es
us
ss
Ne
192.168.238.136
10 7 25 6 132
CRITICAL HIGH MEDIUM LOW INFO
Host Information
ls
MAC Address: 00:0C:29:EE:31:96
OS: Linux Kernel 2.6 on Ubuntu 8.04 (hardy)
ia
Vulnerabilities
nt
134862 - Apache Tomcat A JP Connector Request Injection (Ghostcat)
se
Synopsis
Description
A file read/inclusion vulnerability was found in A JP connector. A remote, unauthenticated attacker could
exploit this vulnerability to read web application files from a vulnerable server. In instances where the
vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within
us
See Also
ss
http://www.nessus.org/u?8ebe6246
http://www.nessus.org/u?4e287adb
Ne
http://www.nessus.org/u?cbc3d54e
https://access.redhat.com/security/cve/CVE-2020-1745
https://access.redhat.com/solutions/4851251
http://www.nessus.org/u?dd218234
http://www.nessus.org/u?dd772531
http://www.nessus.org/u?2a01d6bf
http://www.nessus.org/u?3b5af27e
http://www.nessus.org/u?9dab109f
http://www.nessus.org/u?5eafcf70
192.168.238.136 4
Solution
Update the A JP configuration to require authorization and/or upgrade the Tomcat server to 7.0.100, 8.5.51,
9.0.31 or later.
Risk Factor
High
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
VPR Score
9.0
EPSS Score
0.9737
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.5 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2020-1745
CVE CVE-2020-1938
XREF CISA-KNOWN-EXPLOITED:2022/03/17
XREF CEA-ID:CEA-2020-0021
Plugin Information
Plugin Output
tcp/8009/ajp13
192.168.238.136 5
Nessus was able to exploit the issue using the following request :
0x0000: 02 02 00 08 48 54 54 50 2F 31 2E 31 00 00 0F 2F ....HTTP/1.1.../
0x0010: 61 73 64 66 2F 78 78 78 78 78 2E 6A 73 70 00 00 asdf/xxxxx.jsp..
0x0020: 09 6C 6F 63 61 6C 68 6F 73 74 00 FF FF 00 09 6C .localhost.....l
0x0030: 6F 63 61 6C 68 6F 73 74 00 00 50 00 00 09 A0 06 ocalhost..P.....
0x0040: 00 0A 6B 65 65 70 2D 61 6C 69 76 65 00 00 0F 41 ..keep-alive...A
0x0050: 63 63 65 70 74 2D 4C 61 6E 67 75 61 67 65 00 00 ccept-Language..
0x0060: 0E 65 6E 2D 55 53 2C 65 6E 3B 71 3D 30 2E 35 00 .en-US,en;q=0.5.
0x0070: A0 08 00 01 30 00 00 0F 41 63 63 65 70 74 2D 45 ....0...Accept-E
0x0080: 6E 63 6F 64 69 6E 67 00 00 13 67 7A 69 70 2C 20 ncoding...gzip,
0x0090: 64 65 66 6C 61 74 65 2C 20 73 64 63 68 00 00 0D deflate, sdch...
0x00A0: 43 61 63 68 65 2D 43 6F 6E 74 72 6F 6C 00 00 09 Cache-Control...
0x00B0: 6D 61 78 2D 61 67 65 3D 30 00 A0 0E 00 07 4D 6F max-age=0.....Mo
0x00C0: 7A 69 6C 6C 61 00 00 19 55 70 67 72 61 64 65 2D zilla...Upgrade-
0x00D0: 49 6E 73 65 63 75 72 65 2D 52 65 71 75 65 73 74 Insecure-Request
0x00E0: 73 00 00 01 31 00 A0 01 00 09 74 65 78 74 2F 68 s...1.....text/h
0x00F0: 74 6D 6C 00 A0 0B 00 09 6C 6F 63 61 6C 68 6F 73 tml.....localhos
0x0100: 74 00 0A 00 21 6A 61 76 61 78 2E 73 65 72 76 6C t...!javax.servl
0x0110: 65 74 2E 69 6E 63 6C 75 64 65 2E 72 65 71 75 65 et.include.reque
0x0120: 73 74 5F 75 72 69 00 00 01 31 00 0A 00 1F 6A 61 st_uri...1....ja
0x0130: 76 61 78 2E 73 65 72 76 6C 65 74 2E 69 6E 63 6C vax.servlet.incl
0x0140: 75 64 65 2E 70 61 74 68 5F 69 6E 66 6F 00 00 10 ude.path_info...
0x0150: 2F 57 45 42 2D 49 4E 46 2F 77 65 62 2E 78 6D 6C /WEB-INF/web.xml
0x0160: 00 0A 00 22 6A 61 76 61 78 2E 73 65 72 76 6C 65 ..."javax.servle
0x0170: 74 2E 69 6E 63 6C 75 64 65 2E 73 65 72 76 6C 65 t.include.servle
0x0180: 74 5F 70 61 74 68 00 00 00 00 FF t_path.....
192.168.238.136 6
171340 - Apache Tomcat SEoL (<= 5.5.x)
Synopsis
Description
According to its version, Apache Tomcat is less than or equal to 5.5.x. It is, therefore, no longer maintained
by its vendor or provider.
Lack of support implies that no new security patches for the product will be released by the vendor. As a
result, it may contain security vulnerabilities.
See Also
https://tomcat.apache.org/tomcat-55-eol.html
Solution
Risk Factor
Critical
10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Plugin Output
tcp/8180/www
URL : http://192.168.238.136:8180/
Installed version : 5.5
Security End of Life : September 29, 2012
Time since Security End of Life (Est.) : >= 12 years
192.168.238.136 7
51988 - Bind Shell Backdoor Detection
Synopsis
Description
A shell is listening on the remote port without any authentication being required. An attacker may use it by
connecting to the remote port and sending commands directly.
Solution
Verify if the remote host has been compromised, and reinstall the system if necessary.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Plugin Output
tcp/1524/wild_shell
192.168.238.136 8
32314 - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness
Synopsis
Description
The remote SSH host key has been generated on a Debian or Ubuntu system which contains a bug in the
random number generator of its OpenSSL library.
The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.
An attacker can easily obtain the private part of the remote key and use this to set up decipher the remote
session or set up a man in the middle attack.
See Also
http://www.nessus.org/u?107f9bdc
http://www.nessus.org/u?f14f4224
Solution
Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH,
SSL and OpenVPN key material should be re-generated.
Risk Factor
Critical
VPR Score
5.1
EPSS Score
0.1175
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
192.168.238.136 9
BID 29179
CVE CVE-2008-0166
XREF CWE:310
Exploitable With
Plugin Information
Plugin Output
tcp/22/ssh
192.168.238.136 10
32321 - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)
Synopsis
Description
The remote x509 certificate on the remote SSL server has been generated on a Debian or Ubuntu system
which contains a bug in the random number generator of its OpenSSL library.
The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.
An attacker can easily obtain the private part of the remote key and use this to decipher the remote session
or set up a man in the middle attack.
See Also
http://www.nessus.org/u?107f9bdc
http://www.nessus.org/u?f14f4224
Solution
Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH,
SSL and OpenVPN key material should be re-generated.
Risk Factor
Critical
VPR Score
5.1
EPSS Score
0.1175
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
192.168.238.136 11
BID 29179
CVE CVE-2008-0166
XREF CWE:310
Exploitable With
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 12
32321 - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)
Synopsis
Description
The remote x509 certificate on the remote SSL server has been generated on a Debian or Ubuntu system
which contains a bug in the random number generator of its OpenSSL library.
The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.
An attacker can easily obtain the private part of the remote key and use this to decipher the remote session
or set up a man in the middle attack.
See Also
http://www.nessus.org/u?107f9bdc
http://www.nessus.org/u?f14f4224
Solution
Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH,
SSL and OpenVPN key material should be re-generated.
Risk Factor
Critical
VPR Score
5.1
EPSS Score
0.1175
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
192.168.238.136 13
BID 29179
CVE CVE-2008-0166
XREF CWE:310
Exploitable With
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136 14
20007 - SSL Version 2 and 3 Protocol Detection
Synopsis
The remote service encrypts traffic using a protocol with known weaknesses.
Description
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are
affected by several cryptographic flaws, including:
An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications
between the affected service and clients.
Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so
that these versions will be used only if the client or server support nothing better), many web browsers
implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE).
Therefore, it is recommended that these protocols be disabled entirely.
NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of
enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong
cryptography'.
See Also
https://www.schneier.com/academic/paperfiles/paper-ssl.pdf
http://www.nessus.org/u?b06c7e95
http://www.nessus.org/u?247c4540
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://www.nessus.org/u?5d15ba70
https://www.imperialviolet.org/2014/10/14/poodle.html
https://tools.ietf.org/html/rfc7507
https://tools.ietf.org/html/rfc7568
Solution
Risk Factor
Critical
192.168.238.136 15
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Plugin Output
tcp/25/smtp
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 16
20007 - SSL Version 2 and 3 Protocol Detection
Synopsis
The remote service encrypts traffic using a protocol with known weaknesses.
Description
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are
affected by several cryptographic flaws, including:
An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications
between the affected service and clients.
Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so
that these versions will be used only if the client or server support nothing better), many web browsers
implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE).
Therefore, it is recommended that these protocols be disabled entirely.
NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of
enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong
cryptography'.
See Also
https://www.schneier.com/academic/paperfiles/paper-ssl.pdf
http://www.nessus.org/u?b06c7e95
http://www.nessus.org/u?247c4540
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://www.nessus.org/u?5d15ba70
https://www.imperialviolet.org/2014/10/14/poodle.html
https://tools.ietf.org/html/rfc7507
https://tools.ietf.org/html/rfc7568
Solution
Risk Factor
Critical
192.168.238.136 17
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Plugin Output
tcp/5432/postgresql
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 18
46882 - UnrealIRCd Backdoor Detection
Synopsis
Description
The remote IRC server is a version of UnrealIRCd with a backdoor that allows an attacker to execute
arbitrary code on the affected host.
See Also
https://seclists.org/fulldisclosure/2010/Jun/277
https://seclists.org/fulldisclosure/2010/Jun/284
http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt
Solution
Re-download the software, verify it using the published MD5 / SHA1 checksums, and re-install it.
Risk Factor
Critical
VPR Score
7.4
EPSS Score
0.7132
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
BID 40820
CVE CVE-2010-2075
Exploitable With
192.168.238.136 19
CANVAS (true) Metasploit (true)
Plugin Information
Plugin Output
tcp/6667/irc
uid=0(root) gid=0(root)
192.168.238.136 20
61708 - VNC Server 'password' Password
Synopsis
A VNC server running on the remote host is secured with a weak password.
Description
The VNC server running on the remote host is secured with a weak password. Nessus was able to login
using VNC authentication and a password of 'password'. A remote, unauthenticated attacker could exploit
this to take control of the system.
Solution
Risk Factor
Critical
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Plugin Output
tcp/5900/vnc
192.168.238.136 21
136769 - ISC BIND Service Downgrade / Reflected DoS
Synopsis
The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.
Description
According to its self-reported version, the instance of ISC BIND 9 running on the remote name server
is affected by performance downgrade and Reflected DoS vulnerabilities. This is due to BIND DNS not
sufficiently limiting the number fetches which may be performed while processing a referral response.
An unauthenticated, remote attacker can exploit this to cause degrade the service of the recursive server or
to use the affected server as a reflector in a reflection attack.
See Also
https://kb.isc.org/docs/cve-2020-8616
Solution
Risk Factor
Medium
8.6 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
7.7 (CVSS:3.0/E:P/RL:O/RC:C)
VPR Score
5.2
EPSS Score
0.0164
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
192.168.238.136 22
3.9 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
References
CVE CVE-2020-8616
XREF IAVA:2020-A-0217-S
Plugin Information
Plugin Output
udp/53/dns
192.168.238.136 23
42256 - NFS Shares World Readable
Synopsis
Description
The remote NFS server is exporting one or more shares without restricting access (based on hostname, IP,
or IP range).
See Also
http://www.tldp.org/HOWTO/NFS-HOWTO/security.html
Solution
Risk Factor
Medium
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Plugin Output
tcp/2049/rpc-nfs
/ *
192.168.238.136 24
42873 - SSL Medium Strength Cipher Suites Supported (SWEET32)
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards
medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that
uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same
physical network.
See Also
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
VPR Score
5.1
EPSS Score
0.0053
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
References
CVE CVE-2016-2183
192.168.238.136 25
Plugin Information
Plugin Output
tcp/25/smtp
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 26
42873 - SSL Medium Strength Cipher Suites Supported (SWEET32)
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards
medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that
uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same
physical network.
See Also
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
VPR Score
5.1
EPSS Score
0.0053
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
References
CVE CVE-2016-2183
192.168.238.136 27
Plugin Information
Plugin Output
tcp/5432/postgresql
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 28
90509 - Samba Badlock Vulnerability
Synopsis
An SMB server running on the remote host is affected by the Badlock vulnerability.
Description
The version of Samba, a CIFS/SMB server for Linux and Unix, running on the remote host is affected by
a flaw, known as Badlock, that exists in the Security Account Manager (SAM) and Local Security Authority
(Domain Policy) (LSAD) protocols due to improper authentication level negotiation over Remote Procedure
Call (RPC) channels. A man-in-the-middle attacker who is able to able to intercept the traffic between a
client and a server hosting a SAM database can exploit this flaw to force a downgrade of the authentication
level, which allows the execution of arbitrary Samba network calls in the context of the intercepted user,
such as viewing or modifying sensitive security data in the Active Directory (AD) database or disabling
critical services.
See Also
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html
Solution
Risk Factor
Medium
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
5.9
EPSS Score
0.0358
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
192.168.238.136 29
CVSS v2.0 Temporal Score
5.0 (CVSS2#E:U/RL:OF/RC:C)
References
BID 86002
CVE CVE-2016-2118
XREF CERT:813296
Plugin Information
Plugin Output
tcp/445/cifs
Nessus detected that the Samba Badlock patch has not been applied.
192.168.238.136 30
10205 - rlogin Service Detection
Synopsis
Description
The rlogin service is running on the remote host. This service is vulnerable since data is passed between
the rlogin client and server in cleartext. A man-in-the-middle attacker can exploit this to sniff logins and
passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable
to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local
network) then it may be possible to bypass authentication.
Finally, rlogin is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files.
Solution
Comment out the 'login' line in /etc/inetd.conf and restart the inetd process. Alternatively, disable this
service and use SSH instead.
Risk Factor
High
VPR Score
7.4
EPSS Score
0.015
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
References
CVE CVE-1999-0651
Exploitable With
Metasploit (true)
Plugin Information
192.168.238.136 31
Plugin Output
tcp/513/rlogin
192.168.238.136 32
10245 - rsh Service Detection
Synopsis
Description
The rsh service is running on the remote host. This service is vulnerable since data is passed between
the rsh client and server in cleartext. A man-in-the-middle attacker can exploit this to sniff logins and
passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable
to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local
network) then it may be possible to bypass authentication.
Finally, rsh is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files.
Solution
Comment out the 'rsh' line in /etc/inetd.conf and restart the inetd process. Alternatively, disable this service
and use SSH instead.
Risk Factor
High
VPR Score
7.4
EPSS Score
0.015
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
References
CVE CVE-1999-0651
Exploitable With
Metasploit (true)
Plugin Information
192.168.238.136 33
Plugin Output
tcp/514/rsh
192.168.238.136 34
12085 - Apache Tomcat Default Files
Synopsis
Description
The default error page, default index page, example JSPs and/or example servlets are installed on the
remote Apache Tomcat server. These files should be removed as they may help an attacker uncover
information about the remote Tomcat install or host itself.
See Also
http://www.nessus.org/u?4cb3b4dd
https://www.owasp.org/index.php/Securing_tomcat
Solution
Delete the default index page and remove the example JSP and servlets. Follow the Tomcat or OWASP
instructions to replace or modify the default error page.
Risk Factor
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Plugin Output
tcp/8180/www
http://192.168.238.136:8180/tomcat-docs/index.html
The server is not configured to return a custom page in the event of a client requesting a non-
existent resource.
This may result in a potential disclosure of sensitive information about the server to attackers.
192.168.238.136 35
192.168.238.136 36
12217 - DNS Server Cache Snooping Remote Information Disclosure
Synopsis
Description
The remote DNS server responds to queries for third-party domains that do not have the recursion bit set.
This may allow a remote attacker to determine which domains have recently been resolved via this name
server, and therefore which hosts have been recently visited.
For instance, if an attacker was interested in whether your company utilizes the online services of a
particular financial institution, they would be able to use this attack to build a statistical model regarding
company usage of that financial institution. Of course, the attack can also be used to find B2B partners,
web-surfing patterns, external mail servers, and more.
Note: If this is an internal DNS server not accessible to outside networks, attacks would be limited to the
internal network. This may include employees, consultants and potentially users on a guest network or
WiFi connection if supported.
See Also
http://cs.unc.edu/~fabian/course_papers/cache_snooping.pdf
Solution
Risk Factor
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Plugin Output
udp/53/dns
192.168.238.136 37
Nessus sent a non-recursive query for example.edu
and received 1 answer :
93.184.215.14
192.168.238.136 38
11213 - HTTP TRACE / TRACK Methods Allowed
Synopsis
Description
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods
that are used to debug web server connections.
See Also
http://www.nessus.org/u?e979b5cb
http://www.apacheweek.com/issues/03-01-24
https://download.oracle.com/sunalerts/1000718.1.html
Solution
Disable these HTTP methods. Refer to the plugin output for more information.
Risk Factor
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.0
EPSS Score
0.0058
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 (CVSS2#E:U/RL:OF/RC:C)
192.168.238.136 39
References
BID 9506
BID 9561
BID 11604
BID 33374
BID 37995
CVE CVE-2003-1567
CVE CVE-2004-2320
CVE CVE-2010-0386
XREF CERT:288308
XREF CERT:867593
XREF CWE:16
XREF CWE:200
Plugin Information
Plugin Output
tcp/80/www
To disable these methods, add the following lines for each virtual
host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
192.168.238.136 40
Host: 192.168.238.136
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
192.168.238.136 41
139915 - ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS
Synopsis
Description
According to its self-reported version number, the installation of ISC BIND running on the remote name
server is version 9.x prior to 9.11.22, 9.12.x prior to 9.16.6 or 9.17.x prior to 9.17.4. It is, therefore, affected
by a denial of service (DoS) vulnerability due to an assertion failure when attempting to verify a truncated
response to a TSIG-signed request. An authenticated, remote attacker can exploit this issue by sending a
truncated response to a TSIG-signed request to trigger an assertion failure, causing the server to exit.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported
version number.
See Also
https://kb.isc.org/docs/cve-2020-8622
Solution
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
5.7 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.4
EPSS Score
0.004
4.0 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)
192.168.238.136 42
CVSS v2.0 Temporal Score
3.0 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
CVE CVE-2020-8622
XREF IAVA:2020-A-0385-S
Plugin Information
Plugin Output
udp/53/dns
192.168.238.136 43
136808 - ISC BIND Denial of Service
Synopsis
Description
A denial of service (DoS) vulnerability exists in ISC BIND versions 9.11.18 / 9.11.18-S1 / 9.12.4-P2 / 9.13 /
9.14.11 / 9.15 / 9.16.2 / 9.17 / 9.17.1 and earlier. An unauthenticated, remote attacker can exploit this issue,
via a specially-crafted message, to cause the service to stop responding.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported
version number.
See Also
https://kb.isc.org/docs/cve-2020-8617
Solution
Upgrade to the patched release most closely related to your current version of BIND.
Risk Factor
Medium
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.3 (CVSS:3.0/E:P/RL:O/RC:C)
VPR Score
4.4
EPSS Score
0.972
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
192.168.238.136 44
3.4 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
References
CVE CVE-2020-8617
XREF IAVA:2020-A-0217-S
Plugin Information
Plugin Output
udp/53/dns
192.168.238.136 45
33447 - Multiple Vendor DNS Query ID Field Prediction Cache Poisoning
Synopsis
The remote name resolver (or the server it uses upstream) is affected by a DNS cache poisoning
vulnerability.
Description
The remote DNS resolver does not use random ports when making queries to third-party DNS servers. An
unauthenticated, remote attacker can exploit this to poison the remote DNS server, allowing the attacker to
divert legitimate traffic to arbitrary sites.
See Also
https://www.cnet.com/news/massive-coordinated-dns-patch-released/
https://www.theregister.co.uk/2008/07/21/dns_flaw_speculation/
Solution
Risk Factor
Medium
6.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)
6.1 (CVSS:3.0/E:P/RL:O/RC:C)
VPR Score
6.0
EPSS Score
0.1457
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
192.168.238.136 46
3.9 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
References
BID 30131
CVE CVE-2008-1447
XREF CERT:800113
XREF IAVA:2008-A-0045
XREF EDB-ID:6122
XREF EDB-ID:6123
XREF EDB-ID:6130
Plugin Information
Plugin Output
udp/53/dns
192.168.238.136 47
57608 - SMB Signing not required
Synopsis
Description
Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to
conduct man-in-the-middle attacks against the SMB server.
See Also
http://www.nessus.org/u?df39b8b3
http://technet.microsoft.com/en-us/library/cc731957.aspx
http://www.nessus.org/u?74b80723
https://www.samba.org/samba/docs/current/man-html/smb.conf.5.html
http://www.nessus.org/u?a3cac4ea
Solution
Enforce message signing in the host's configuration. On Windows, this is found in the policy setting
'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server
signing'. See the 'see also' links for further details.
Risk Factor
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
4.6 (CVSS:3.0/E:U/RL:O/RC:C)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 (CVSS2#E:U/RL:OF/RC:C)
Plugin Information
192.168.238.136 48
Published: 2012/01/19, Modified: 2022/10/05
Plugin Output
tcp/445/cifs
192.168.238.136 49
52611 - SMTP Service STARTTLS Plaintext Command Injection
Synopsis
The remote mail service allows plaintext command injection while negotiating an encrypted
communications channel.
Description
The remote SMTP service contains a software flaw in its STARTTLS implementation that could allow a
remote, unauthenticated attacker to inject commands during the plaintext protocol phase that will be
executed during the ciphertext protocol phase.
Successful exploitation could allow an attacker to steal a victim's email or associated SASL (Simple
Authentication and Security Layer) credentials.
See Also
https://tools.ietf.org/html/rfc2487
https://www.securityfocus.com/archive/1/516901/30/0/threaded
Solution
Risk Factor
Medium
VPR Score
7.3
EPSS Score
0.0114
4.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
3.1 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 46767
192.168.238.136 50
CVE CVE-2011-0411
CVE CVE-2011-1430
CVE CVE-2011-1431
CVE CVE-2011-1432
CVE CVE-2011-1506
CVE CVE-2011-2165
XREF CERT:555316
Plugin Information
Plugin Output
tcp/25/smtp
STARTTLS\r\nRSET\r\n
192.168.238.136 51
31705 - SSL Anonymous Cipher Suites Supported
Synopsis
Description
The remote host supports the use of anonymous SSL ciphers. While this enables an administrator to set up
a service that encrypts traffic without having to generate and configure SSL certificates, it offers no way to
verify the remote host's identity and renders the service vulnerable to a man-in-the-middle attack.
Note: This is considerably easier to exploit if the attacker is on the same physical network.
See Also
http://www.nessus.org/u?3a040ada
Solution
Risk Factor
Low
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.4
EPSS Score
0.0031
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
1.9 (CVSS2#E:U/RL:OF/RC:C)
192.168.238.136 52
References
BID 28482
CVE CVE-2007-1858
Plugin Information
Plugin Output
tcp/25/smtp
The following is a list of SSL anonymous ciphers supported by the remote TCP server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 53
51192 - SSL Certificate Cannot Be Trusted
Synopsis
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which
the chain of trust can be broken, as stated below :
- First, the top of the certificate chain sent by the server might not be descended from a known public
certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are missing that would connect the top of the certificate chain
to a known public certificate authority.
- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a
signing algorithm that Nessus either does not support or does not recognize.
If the remote host is a public host in production, any break in the chain makes it more difficult for users
to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-
middle attacks against the remote host.
See Also
https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509
Solution
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
192.168.238.136 54
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 55
51192 - SSL Certificate Cannot Be Trusted
Synopsis
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which
the chain of trust can be broken, as stated below :
- First, the top of the certificate chain sent by the server might not be descended from a known public
certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are missing that would connect the top of the certificate chain
to a known public certificate authority.
- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a
signing algorithm that Nessus either does not support or does not recognize.
If the remote host is a public host in production, any break in the chain makes it more difficult for users
to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-
middle attacks against the remote host.
See Also
https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509
Solution
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
192.168.238.136 56
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136 57
15901 - SSL Certificate Expiry
Synopsis
Description
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and
reports whether any have already expired.
Solution
Risk Factor
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 58
15901 - SSL Certificate Expiry
Synopsis
Description
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and
reports whether any have already expired.
Solution
Risk Factor
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136 59
45411 - SSL Certificate with Wrong Hostname
Synopsis
Description
The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.
Solution
Risk Factor
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136
192.168.238.136
ubuntu804-base.localdomain
192.168.238.136 60
45411 - SSL Certificate with Wrong Hostname
Synopsis
Description
The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.
Solution
Risk Factor
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136
192.168.238.136
ubuntu804-base.localdomain
192.168.238.136 61
89058 - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened
eNcryption)
Synopsis
The remote host may be affected by a vulnerability that allows a remote attacker to potentially decrypt
captured TLS traffic.
Description
The remote host supports SSLv2 and therefore may be affected by a vulnerability that allows a cross-
protocol Bleichenbacher padding oracle attack known as DROWN (Decrypting RSA with Obsolete and
Weakened eNcryption). This vulnerability exists due to a flaw in the Secure Sockets Layer Version 2 (SSLv2)
implementation, and it allows captured TLS traffic to be decrypted. A man-in-the-middle attacker can
exploit this to decrypt the TLS connection by utilizing previously captured traffic and weak cryptography
along with a series of specially crafted connections to an SSLv2 server that uses the same private key.
See Also
https://drownattack.com/
https://drownattack.com/drown-attack-paper.pdf
Solution
Disable SSLv2 and export grade cryptography cipher suites. Ensure that private keys are not used anywhere
with server software that supports SSLv2 connections.
Risk Factor
Medium
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
3.6
EPSS Score
0.9434
192.168.238.136 62
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 83733
CVE CVE-2016-0800
XREF CERT:583776
Plugin Information
Plugin Output
tcp/25/smtp
The remote host is affected by SSL DROWN and supports the following
vulnerable cipher suites :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 63
65821 - SSL RC4 Cipher Suites Supported (Bar Mitzvah)
Synopsis
Description
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of
small biases are introduced into the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of
millions) ciphertexts, the attacker may be able to derive the plaintext.
See Also
https://www.rc4nomore.com/
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
Solution
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with
AES-GCM suites subject to browser and web server support.
Risk Factor
Medium
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.4 (CVSS:3.0/E:U/RL:X/RC:C)
VPR Score
4.4
EPSS Score
0.0076
192.168.238.136 64
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.7 (CVSS2#E:U/RL:ND/RC:C)
References
BID 58796
BID 73684
CVE CVE-2013-2566
CVE CVE-2015-2808
Plugin Information
Plugin Output
tcp/25/smtp
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 65
65821 - SSL RC4 Cipher Suites Supported (Bar Mitzvah)
Synopsis
Description
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of
small biases are introduced into the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of
millions) ciphertexts, the attacker may be able to derive the plaintext.
See Also
https://www.rc4nomore.com/
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
Solution
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with
AES-GCM suites subject to browser and web server support.
Risk Factor
Medium
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.4 (CVSS:3.0/E:U/RL:X/RC:C)
VPR Score
4.4
EPSS Score
0.0076
192.168.238.136 66
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.7 (CVSS2#E:U/RL:ND/RC:C)
References
BID 58796
BID 73684
CVE CVE-2013-2566
CVE CVE-2015-2808
Plugin Information
Plugin Output
tcp/5432/postgresql
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 67
57582 - SSL Self-Signed Certificate
Synopsis
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Description
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote
host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-
middle attack against the remote host.
Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but
is signed by an unrecognized certificate authority.
Solution
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 68
57582 - SSL Self-Signed Certificate
Synopsis
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Description
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote
host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-
middle attack against the remote host.
Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but
is signed by an unrecognized certificate authority.
Solution
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136 69
26928 - SSL Weak Cipher Suites Supported
Synopsis
Description
The remote host supports the use of SSL ciphers that offer weak encryption.
Note: This is considerably easier to exploit if the attacker is on the same physical network.
See Also
http://www.nessus.org/u?6527892d
Solution
Reconfigure the affected application, if possible to avoid the use of weak ciphers.
Risk Factor
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
References
XREF CWE:326
XREF CWE:327
XREF CWE:720
XREF CWE:753
XREF CWE:803
XREF CWE:928
XREF CWE:934
Plugin Information
Plugin Output
192.168.238.136 70
tcp/25/smtp
Here is the list of weak SSL ciphers supported by the remote server :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 71
81606 - SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)
Synopsis
Description
The remote host supports EXPORT_RSA cipher suites with keys less than or equal to 512 bits. An attacker
can factor a 512-bit RSA modulus in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to use EXPORT_RSA cipher suites (e.g.
CVE-2015-0204). Thus, it is recommended to remove support for weak cipher suites.
See Also
https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4
Solution
Risk Factor
Medium
VPR Score
3.7
EPSS Score
0.9488
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 71936
CVE CVE-2015-0204
192.168.238.136 72
XREF CERT:243585
Plugin Information
Plugin Output
tcp/25/smtp
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 73
104743 - TLS Version 1.0 Protocol Detection
Synopsis
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic
design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like
1.2 and 1.3 are designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly
with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and
the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any
known exploits.
See Also
https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
Solution
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)
6.1 (CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N)
References
XREF CWE:327
Plugin Information
Plugin Output
192.168.238.136 74
tcp/25/smtp
192.168.238.136 75
104743 - TLS Version 1.0 Protocol Detection
Synopsis
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic
design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like
1.2 and 1.3 are designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly
with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and
the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any
known exploits.
See Also
https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
Solution
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)
6.1 (CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N)
References
XREF CWE:327
Plugin Information
Plugin Output
192.168.238.136 76
tcp/5432/postgresql
192.168.238.136 77
42263 - Unencrypted Telnet Server
Synopsis
Description
Using Telnet over an unencrypted channel is not recommended as logins, passwords, and commands are
transferred in cleartext. This allows a remote, man-in-the-middle attacker to eavesdrop on a Telnet session
to obtain credentials or other sensitive information and to modify traffic exchanged between a client and
server.
SSH is preferred over Telnet since it protects credentials from eavesdropping and can tunnel additional
data streams such as an X11 session.
Solution
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
Plugin Information
Plugin Output
tcp/23/telnet
Nessus collected the following banner from the remote Telnet server :
192.168.238.136 78
Contact: msfdev[at]metasploit.com
Login with msfadmin/msfadmin to get started
metasploitable login:
------------------------------ snip ------------------------------
192.168.238.136 79
10114 - ICMP Timestamp Request Remote Date Disclosure
Synopsis
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that
is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-
based authentication protocols.
Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect,
but usually within 1000 seconds of the actual system time.
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
Low
VPR Score
2.2
EPSS Score
0.8808
2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
References
CVE CVE-1999-0524
XREF CWE:200
Plugin Information
Plugin Output
icmp/0
192.168.238.136 80
The difference between the local and remote clocks is -11 seconds.
192.168.238.136 81
83875 - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)
Synopsis
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to
1024 bits.
Description
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal
to 1024 bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount
of time (depending on modulus size and attacker resources). This may allow an attacker to recover the
plaintext or potentially violate the integrity of connections.
See Also
https://weakdh.org/
Solution
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.
Risk Factor
Low
3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
3.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.5
EPSS Score
0.9736
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
1.9 (CVSS2#E:U/RL:OF/RC:C)
192.168.238.136 82
References
BID 74733
CVE CVE-2015-4000
XREF CEA-ID:CEA-2021-0004
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 83
83738 - SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam)
Synopsis
Description
The remote host supports EXPORT_DHE cipher suites with keys less than or equal to 512 bits. Through
cryptanalysis, a third party can find the shared secret in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to use EXPORT_DHE cipher suites.
Thus, it is recommended to remove support for weak cipher suites.
See Also
https://weakdh.org/
Solution
Risk Factor
Low
3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
3.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.5
EPSS Score
0.9736
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
2.2 (CVSS2#E:U/RL:ND/RC:C)
192.168.238.136 84
References
BID 74733
CVE CVE-2015-4000
XREF CEA-ID:CEA-2021-0004
Plugin Information
Plugin Output
tcp/25/smtp
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 85
78479 - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)
Synopsis
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
Description
The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as
POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a
victim application to repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1
or newer is supported by the client and service.
The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients;
however, it can only protect connections when the client and service support the mechanism. Sites that
cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is
the only way to completely mitigate the vulnerability.
See Also
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
Solution
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be
disabled.
Risk Factor
Medium
3.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N)
3.1 (CVSS:3.0/E:P/RL:O/RC:C)
192.168.238.136 86
VPR Score
5.1
EPSS Score
0.9749
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 70574
CVE CVE-2014-3566
XREF CERT:577193
Plugin Information
Plugin Output
tcp/25/smtp
Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.
192.168.238.136 87
78479 - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)
Synopsis
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
Description
The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as
POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a
victim application to repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1
or newer is supported by the client and service.
The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients;
however, it can only protect connections when the client and service support the mechanism. Sites that
cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is
the only way to completely mitigate the vulnerability.
See Also
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
Solution
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be
disabled.
Risk Factor
Medium
3.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N)
3.1 (CVSS:3.0/E:P/RL:O/RC:C)
192.168.238.136 88
VPR Score
5.1
EPSS Score
0.9749
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 70574
CVE CVE-2014-3566
XREF CERT:577193
Plugin Information
Plugin Output
tcp/5432/postgresql
Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.
192.168.238.136 89
10407 - X Server Detection
Synopsis
Description
The remote host is running an X11 server. X11 is a client-server protocol that can be used to display
graphical applications running on a given host on a remote client.
Since the X11 traffic is not ciphered, it is possible for an attacker to eavesdrop on the connection.
Solution
Restrict access to this port. If the X11 client/server facility is not used, disable TCP support in X11 entirely (-
nolisten tcp).
Risk Factor
Low
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
Plugin Information
Plugin Output
tcp/6000/x11
192.168.238.136 90
21186 - A JP Connector Detection
Synopsis
Description
The remote host is running an A JP (Apache JServ Protocol) connector, a service by which a standalone web
server such as Apache communicates over TCP with a Java servlet container such as Tomcat.
See Also
http://tomcat.apache.org/connectors-doc/
http://tomcat.apache.org/connectors-doc/ajp/ajpv13a.html
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/8009/ajp13
192.168.238.136 91
18261 - Apache Banner Linux Distribution Disclosure
Synopsis
The name of the Linux distribution running on the remote host was found in the banner of the web server.
Description
Nessus was able to extract the banner of the Apache web server and determine which Linux distribution
the remote host is running.
Solution
If you do not wish to display this information, edit 'httpd.conf' and set the directive 'ServerTokens Prod' and
restart Apache.
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.238.136 92
48204 - Apache HTTP Server Version
Synopsis
It is possible to obtain the version number of the remote Apache HTTP server.
Description
The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the
version number from the banner.
See Also
https://httpd.apache.org/
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0530
Plugin Information
Plugin Output
tcp/80/www
URL : http://192.168.238.136/
Version : 2.2.99
Source : Server: Apache/2.2.8 (Ubuntu) DAV/2
backported : 1
modules : DAV/2
os : ConvertedUbuntu
192.168.238.136 93
39446 - Apache Tomcat Detection
Synopsis
Description
See Also
https://tomcat.apache.org/
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0535
Plugin Information
Plugin Output
tcp/8180/www
URL : http://192.168.238.136:8180/
Version : 5.5
backported : 0
source : Apache Tomcat/5.5
192.168.238.136 94
84574 - Backported Security Patch Detection (PHP)
Synopsis
Description
Security patches may have been 'backported' to the remote PHP install without changing its version
number.
Note that this test is informational only and does not denote any security problem.
See Also
https://access.redhat.com/security/updates/backporting/?sc_cid=3093
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
192.168.238.136 95
39520 - Backported Security Patch Detection (SSH)
Synopsis
Description
Security patches may have been 'backported' to the remote SSH server without changing its version
number.
Note that this test is informational only and does not denote any security problem.
See Also
https://access.redhat.com/security/updates/backporting/?sc_cid=3093
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
192.168.238.136 96
39521 - Backported Security Patch Detection (WWW)
Synopsis
Description
Security patches may have been 'backported' to the remote HTTP server without changing its version
number.
Note that this test is informational only and does not denote any security problem.
See Also
https://access.redhat.com/security/updates/backporting/?sc_cid=3093
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
192.168.238.136 97
45590 - Common Platform Enumeration (CPE)
Synopsis
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform
Enumeration) matches for various hardware and software products found on a host.
Note that if an official CPE is not available for the product, this plugin computes the best possible CPE
based on the information available from the scan.
See Also
http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.238.136 98
cpe:/a:samba:samba:3.0.20 -> Samba Samba
192.168.238.136 99
10028 - DNS Server BIND version Directive Remote Version Detection
Synopsis
Description
The remote host is running BIND or another DNS server that reports its version number when it receives a
special request for the text 'version.bind' in the domain 'chaos'.
This version is not necessarily accurate and could even be forged, as some DNS servers send the
information based on a configuration file.
Solution
It is possible to hide the version number of BIND by using the 'version' directive in the 'options' section in
named.conf.
Risk Factor
None
References
XREF IAVT:0001-T-0583
Plugin Information
Plugin Output
udp/53/dns
Version : 9.4.2
192.168.238.136 100
35373 - DNS Server DNSSEC Aware Resolver
Synopsis
Description
The remote DNS resolver accepts DNSSEC options. This means that it may verify the authenticity of
DNSSEC protected zones if it is configured to trust their keys.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/53/dns
192.168.238.136 101
11002 - DNS Server Detection
Synopsis
Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames
and IP addresses.
See Also
https://en.wikipedia.org/wiki/Domain_Name_System
Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available
externally.
Risk Factor
None
Plugin Information
Plugin Output
tcp/53/dns
192.168.238.136 102
11002 - DNS Server Detection
Synopsis
Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames
and IP addresses.
See Also
https://en.wikipedia.org/wiki/Domain_Name_System
Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available
externally.
Risk Factor
None
Plugin Information
Plugin Output
udp/53/dns
192.168.238.136 103
72779 - DNS Server Version Detection
Synopsis
Nessus was able to obtain version information on the remote DNS server.
Description
Nessus was able to obtain version information by sending a special TXT record query to the remote host.
Note that this version is not necessarily accurate and could even be forged, as some DNS servers send the
information based on a configuration file.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0937
Plugin Information
Plugin Output
tcp/53/dns
9.4.2
192.168.238.136 104
35371 - DNS Server hostname.bind Map Hostname Disclosure
Synopsis
Description
It is possible to learn the remote host name by querying the remote DNS server for 'hostname.bind' in the
CHAOS domain.
Solution
It may be possible to disable this feature. Consult the vendor's documentation for more information.
Risk Factor
None
Plugin Information
Plugin Output
udp/53/dns
metasploitable
192.168.238.136 105
54615 - Device Type
Synopsis
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a
printer, router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.238.136 106
35716 - Ethernet Card Manufacturer Detection
Synopsis
Description
Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are
registered by IEEE.
See Also
https://standards.ieee.org/faqs/regauth.html
http://www.nessus.org/u?794673b4
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.238.136 107
86420 - Ethernet MAC Addresses
Synopsis
This plugin gathers MAC addresses from various sources and consolidates them into a list.
Description
This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and
Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single,
unique, and uniform list.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.238.136 108
10092 - FTP Server Detection
Synopsis
Description
It is possible to obtain the banner of the remote FTP server by connecting to a remote port.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0943
Plugin Information
Plugin Output
tcp/21/ftp
192.168.238.136 109
10107 - HTTP Server Type and Version
Synopsis
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0931
Plugin Information
Plugin Output
tcp/80/www
192.168.238.136 110
10107 - HTTP Server Type and Version
Synopsis
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0931
Plugin Information
Plugin Output
tcp/8180/www
Apache-Coyote/1.1
192.168.238.136 111
24260 - HyperText Transfer Protocol (HTTP) Information
Synopsis
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-
Alive is enabled, etc...
This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
Response Body :
<html><head><title>Metasploitable2 - Linux</title></head><body>
<pre>
_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
192.168.238.136 112
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
|_|
Contact: msfdev[at]metasploit.com
</pre>
<ul>
<li><a href="/twiki/">TWiki</a></li>
<li><a href="/phpMyAdmin/">phpMyAdmin</a></li>
<li><a href="/mutillidae/">Mutillidae</a></li>
<li><a href="/dvwa/">DVWA</a></li>
<li><a href="/dav/">WebDAV</a></li>
</ul>
</body>
</html>
192.168.238.136 113
24260 - HyperText Transfer Protocol (HTTP) Information
Synopsis
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-
Alive is enabled, etc...
This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/8180/www
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Date: Wed, 18 Dec 2024 04:11:55 GMT
Connection: close
Response Body :
<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
192.168.238.136 114
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
img {
border: none;
}
a:link, a:visited {
color: blue
}
th {
font-family: Verdana, "Times New Roman", Times, serif;
font-size: 110%;
font-weight: normal;
font-style: italic;
background: #D2A41C;
text-align: left;
}
td {
color: #000000;
font-family: Arial, Helvetica, sans-serif;
}
td.men [...]
192.168.238.136 115
11156 - IRC Daemon Version Detection
Synopsis
Description
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/6667/irc
192.168.238.136 116
10397 - Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
Synopsis
Description
It was possible to obtain the browse list of the remote Windows system by sending a request to the
LANMAN pipe. The browse list is the list of the nearest Windows systems of the remote host.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445/cifs
DESKTOP-H81VICG ( os : 0.0 )
METASPLOITABLE ( os : 0.0 )
192.168.238.136 117
10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure
Synopsis
Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by
sending an authentication request to port 139 or 445. Note that this plugin requires SMB to be enabled on
the host.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445/cifs
192.168.238.136 118
11011 - Microsoft Windows SMB Service Detection
Synopsis
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB)
protocol, used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/139/smb
192.168.238.136 119
11011 - Microsoft Windows SMB Service Detection
Synopsis
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB)
protocol, used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445/cifs
192.168.238.136 120
100871 - Microsoft Windows SMB Versions Supported (remote check)
Synopsis
It was possible to obtain information about the version of SMB running on the remote host.
Description
Nessus was able to obtain the version of SMB running on the remote host by sending an authentication
request to port 139 or 445.
Note that this plugin is a remote check and does not work on agents.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445/cifs
192.168.238.136 121
106716 - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)
Synopsis
It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.
Description
Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an
authentication request to port 139 or 445.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445/cifs
The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.0.2 Windows 2008
2.1 Windows 7
2.2.2 Windows 8 Beta
2.2.4 Windows 8 Beta
3.0 Windows 8
3.0.2 Windows 8.1
3.1 Windows 10
3.1.1 Windows 10
192.168.238.136 122
10719 - MySQL Server Detection
Synopsis
Description
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0802
Plugin Information
Plugin Output
tcp/3306/mysql
Version : 5.0.51a-3ubuntu5
Protocol : 10
Server Status : SERVER_STATUS_AUTOCOMMIT
Server Capabilities :
CLIENT_LONG_FLAG (Get all column flags)
CLIENT_CONNECT_WITH_DB (One can specify db on connect)
CLIENT_COMPRESS (Can use compression protocol)
CLIENT_PROTOCOL_41 (New 4.1 protocol)
CLIENT_SSL (Switch to SSL after handshake)
CLIENT_TRANSACTIONS (Client knows about transactions)
CLIENT_SECURE_CONNECTION (New 4.1 authentication)
192.168.238.136 123
10437 - NFS Share Export List
Synopsis
Description
See Also
http://www.tldp.org/HOWTO/NFS-HOWTO/security.html
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/2049/rpc-nfs
/ *
192.168.238.136 124
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/21/ftp
192.168.238.136 125
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
192.168.238.136 126
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/23/telnet
192.168.238.136 127
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 128
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/53/dns
192.168.238.136 129
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
192.168.238.136 130
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/111/rpc-portmapper
192.168.238.136 131
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/139/smb
192.168.238.136 132
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/445/cifs
192.168.238.136 133
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/512
192.168.238.136 134
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/513/rlogin
192.168.238.136 135
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/514/rsh
192.168.238.136 136
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/1099/rmi_registry
192.168.238.136 137
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/1524/wild_shell
192.168.238.136 138
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/2049/rpc-nfs
192.168.238.136 139
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/2121
192.168.238.136 140
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/3306/mysql
192.168.238.136 141
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/3632
192.168.238.136 142
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136 143
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/5900/vnc
192.168.238.136 144
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/6000/x11
192.168.238.136 145
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/6667/irc
192.168.238.136 146
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/8009/ajp13
192.168.238.136 147
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/8180/www
192.168.238.136 148
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/8787
192.168.238.136 149
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.238.136 150
Scan policy used : Basic Network Scan
Scanner IP : 192.168.238.1
Port scanner(s) : nessus_syn_scanner
Port range : default
Ping RTT : 94.676 ms
Thorough tests : no
Experimental tests : no
Scan for Unpatched Vulnerabilities : no
Plugin debugging enabled : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : no
Credentialed checks : no
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : Detected
Allow post-scan editing : Yes
Nessus Plugin Signature Checking : Enabled
Audit File Signature Checking : Disabled
Scan Start Date : 2024/12/18 5:05 Romance Standard Time
Scan duration : 707 sec
Scan for malware : no
192.168.238.136 151
11936 - OS Identification
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess
the name of the remote operating system in use. It is also possible sometimes to guess the version of the
operating system.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Not all fingerprints could give a match. If you think that these
signatures would help us improve OS fingerprinting, please submit
them by visiting https://www.tenable.com/research/submitsignatures.
SSH:SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
SinFP:
P1:B10113:F0x12:W5840:O0204ffff:M1460:
P2:B10113:F0x12:W5792:O0204ffff0402080affffffff4445414401030305:M1460:
P3:B00000:F0x00:W0:O0:M0
P4:191003_7_p=2121
SMTP:!:220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
SSLcert:!:i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple
Affairss/CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple
Affairs
ed093088706603bfd5dc237399b498da2d4d31c6
i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple Affairss/
CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple Affairs
ed093088706603bfd5dc237399b498da2d4d31c6
The remote host is running Linux Kernel 2.6 on Ubuntu 8.04 (gutsy)
192.168.238.136 152
117886 - OS Security Patch Assessment Not Available
Synopsis
Description
This plugin reports non-failure information impacting the availability of OS Security Patch Assessment.
Failure information is reported by plugin 21745 : 'OS Security Patch Assessment failed'. If a target host is
not supported for OS Security Patch Assessment, plugin 110695 : 'OS Security Patch Assessment Checks
Not Supported' will report concurrently with this plugin.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0515
Plugin Information
Plugin Output
tcp/0
- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided
Message :
Credentials were not provided for detected SSH service.
192.168.238.136 153
181418 - OpenSSH Detection
Synopsis
Description
See Also
https://www.openssh.com/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
Service : ssh
Version : 4.7p1
Banner : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
192.168.238.136 154
50845 - OpenSSL Detection
Synopsis
Description
Based on its response to a TLS request with a specially crafted server name extension, it seems that the
remote service is using the OpenSSL library to encrypt traffic.
Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS
extensions (RFC 4366).
See Also
https://www.openssl.org/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 155
50845 - OpenSSL Detection
Synopsis
Description
Based on its response to a TLS request with a specially crafted server name extension, it seems that the
remote service is using the OpenSSL library to encrypt traffic.
Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS
extensions (RFC 4366).
See Also
https://www.openssl.org/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136 156
48243 - PHP Version Detection
Synopsis
It was possible to obtain the version number of the remote PHP installation.
Description
Nessus was able to determine the version of PHP available on the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0936
Plugin Information
Plugin Output
tcp/80/www
Version : 5.2.4-2ubuntu5.10
Source : X-Powered-By: PHP/5.2.4-2ubuntu5.10
192.168.238.136 157
66334 - Patch Report
Synopsis
Description
The remote host is missing one or more security patches. This plugin lists the newest version of each patch
to install to make sure the remote host is up-to-date.
Note: Because the 'Show missing patches that have been superseded' setting in your scan policy depends
on this plugin, it will always run and cannot be disabled.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
[ ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS (139915) ]
+ Action to take : Re-download the software, verify it using the published MD5 / SHA1 checksums, and
re-install it.
192.168.238.136 158
118224 - PostgreSQL STARTTLS Support
Synopsis
Description
The remote PostgreSQL server supports the use of encryption initiated during pre-login to switch from a
cleartext to an encrypted communications channel.
See Also
https://www.postgresql.org/docs/9.2/protocol-flow.html#AEN96066
https://www.postgresql.org/docs/9.2/protocol-message-formats.html
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]
Issuer Name:
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
192.168.238.136 159
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]
Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC
Version: 1
192.168.238.136 160
26024 - PostgreSQL Server Detection
Synopsis
Description
See Also
https://www.postgresql.org/
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136 161
22227 - RMI Registry Detection
Synopsis
Description
The remote host is running an RMI registry, which acts as a bootstrap naming service for registering and
retrieving remote objects with simple names in the Java Remote Method Invocation (RMI) system.
See Also
https://docs.oracle.com/javase/1.5.0/docs/guide/rmi/spec/rmiTOC.html
http://www.nessus.org/u?b6fd7659
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/1099/rmi_registry
tcp/1099/rmi_registry
192.168.238.136 162
11111 - RPC Services Enumeration
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/111/rpc-portmapper
192.168.238.136 163
11111 - RPC Services Enumeration
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/111/rpc-portmapper
192.168.238.136 164
11111 - RPC Services Enumeration
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/2049/rpc-nfs
192.168.238.136 165
11111 - RPC Services Enumeration
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/2049/rpc-nfs
192.168.238.136 166
11111 - RPC Services Enumeration
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/47313/rpc-status
192.168.238.136 167
11111 - RPC Services Enumeration
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/47905/rpc-nlockmgr
192.168.238.136 168
11111 - RPC Services Enumeration
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/52320/rpc-nlockmgr
192.168.238.136 169
11111 - RPC Services Enumeration
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/58548/rpc-status
192.168.238.136 170
11111 - RPC Services Enumeration
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/58778/rpc-mountd
192.168.238.136 171
11111 - RPC Services Enumeration
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/59645/rpc-mountd
192.168.238.136 172
53335 - RPC portmapper (TCP)
Synopsis
Description
The portmapper allows someone to get the port number of each RPC service running on the remote host
by sending either multiple lookup requests or a DUMP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/111/rpc-portmapper
192.168.238.136 173
10223 - RPC portmapper Service Detection
Synopsis
Description
The portmapper allows someone to get the port number of each RPC service running on the remote host
by sending either multiple lookup requests or a DUMP request.
Solution
n/a
Risk Factor
None
0.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)
0.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:N)
References
CVE CVE-1999-0632
Plugin Information
Plugin Output
udp/111/rpc-portmapper
192.168.238.136 174
10263 - SMTP Server Detection
Synopsis
Description
Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it.
Solution
Disable this service if you do not use it, or filter incoming traffic to this port.
Risk Factor
None
References
XREF IAVT:0001-T-0932
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 175
42088 - SMTP Service STARTTLS Command Support
Synopsis
Description
The remote SMTP service supports the use of the 'STARTTLS' command to switch from a cleartext to an
encrypted communications channel.
See Also
https://en.wikipedia.org/wiki/STARTTLS
https://tools.ietf.org/html/rfc2487
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
Here is the SMTP service's SSL certificate that Nessus was able to
collect after sending a 'STARTTLS' command :
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]
Issuer Name:
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
192.168.238.136 176
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]
Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC
Version: 1
192.168.238.136 177
149334 - SSH Password Authentication Accepted
Synopsis
Description
See Also
https://tools.ietf.org/html/rfc4252#section-8
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
192.168.238.136 178
10881 - SSH Protocol Versions Supported
Synopsis
Description
This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
- 1.99
- 2.0
192.168.238.136 179
10267 - SSH Server Type and Version Information
Synopsis
Description
It is possible to obtain information about the remote SSH server by sending an empty authentication
request.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0933
Plugin Information
Plugin Output
tcp/22/ssh
192.168.238.136 180
56984 - SSL / TLS Versions Supported
Synopsis
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting
communications.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 181
56984 - SSL / TLS Versions Supported
Synopsis
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting
communications.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136 182
45410 - SSL Certificate 'commonName' Mismatch
Synopsis
The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.
Description
The service running on the remote host presents an SSL certificate for which the 'commonName' (CN)
attribute does not match the hostname on which the service listens.
Solution
If the machine has several names, make sure that users connect to the service through the DNS hostname
that matches the common name in the certificate.
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
metasploitable
ubuntu804-base.localdomain
192.168.238.136 183
45410 - SSL Certificate 'commonName' Mismatch
Synopsis
The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.
Description
The service running on the remote host presents an SSL certificate for which the 'commonName' (CN)
attribute does not match the hostname on which the service listens.
Solution
If the machine has several names, make sure that users connect to the service through the DNS hostname
that matches the common name in the certificate.
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
metasploitable
ubuntu804-base.localdomain
192.168.238.136 184
10863 - SSL Certificate Information
Synopsis
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
Subject Name:
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]
Issuer Name:
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]
Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC
Version: 1
192.168.238.136 185
Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01
Fingerprints :
SHA-256 Fingerprint: E7 A7 FA 0D 63 E4 57 C7 C4 A5 9B 38 B7 08 49 C6 A7 0B DA 6F
83 0C 7A F1 E3 2D EE 43 6D E8 13 CC
SHA-1 Fingerprint: ED 09 30 88 70 66 03 BF D5 DC 23 73 99 B4 98 DA 2D [...]
192.168.238.136 186
10863 - SSL Certificate Information
Synopsis
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
Subject Name:
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]
Issuer Name:
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]
Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC
Version: 1
192.168.238.136 187
Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01
Fingerprints :
SHA-256 Fingerprint: E7 A7 FA 0D 63 E4 57 C7 C4 A5 9B 38 B7 08 49 C6 A7 0B DA 6F
83 0C 7A F1 E3 2D EE 43 6D E8 13 CC
SHA-1 Fingerprint: ED 09 30 88 70 66 03 BF D5 DC 23 73 99 B4 98 DA 2D [...]
192.168.238.136 188
70544 - SSL Cipher Block Chaining Cipher Suites Supported
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks
with subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These
cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak
information if used improperly.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
Here is the list of SSL CBC ciphers supported by the remote server :
192.168.238.136 189
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.238.136 190
70544 - SSL Cipher Block Chaining Cipher Suites Supported
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks
with subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These
cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak
information if used improperly.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
Here is the list of SSL CBC ciphers supported by the remote server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.238.136 191
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128)
SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256)
SHA1
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 192
21643 - SSL Cipher Suites Supported
Synopsis
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 193
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.238.136 194
21643 - SSL Cipher Suites Supported
Synopsis
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136 195
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256)
SHA1
RC4-SHA 0x00, 0x05 RSA RSA RC4(128)
SHA1
192.168.238.136 196
62563 - SSL Compression Methods Supported
Synopsis
The remote service supports one or more compression methods for SSL connections.
Description
This script detects which compression methods are supported by the remote service for SSL connections.
See Also
http://www.iana.org/assignments/comp-meth-ids/comp-meth-ids.xml
https://tools.ietf.org/html/rfc3749
https://tools.ietf.org/html/rfc3943
https://tools.ietf.org/html/rfc5246
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
DEFLATE (0x01)
192.168.238.136 197
62563 - SSL Compression Methods Supported
Synopsis
The remote service supports one or more compression methods for SSL connections.
Description
This script detects which compression methods are supported by the remote service for SSL connections.
See Also
http://www.iana.org/assignments/comp-meth-ids/comp-meth-ids.xml
https://tools.ietf.org/html/rfc3749
https://tools.ietf.org/html/rfc3943
https://tools.ietf.org/html/rfc5246
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
DEFLATE (0x01)
192.168.238.136 198
57041 - SSL Perfect Forward Secrecy Cipher Suites Supported
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality
even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These
cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is
compromised.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
Here is the list of SSL PFS ciphers supported by the remote server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.238.136 199
High Strength Ciphers (>= 112-bit key)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 200
57041 - SSL Perfect Forward Secrecy Cipher Suites Supported
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality
even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These
cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is
compromised.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
Here is the list of SSL PFS ciphers supported by the remote server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.238.136 201
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 202
51891 - SSL Session Resume Supported
Synopsis
Description
This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to
receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the
session ID in the second connection, the server maintains a cache of sessions that can be resumed.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 203
156899 - SSL/TLS Recommended Cipher Suites
Synopsis
Description
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to
only enable support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and
compatible with nearly every client released in the last five (or more) years.
See Also
https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 204
The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined
below:
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.238.136 205
156899 - SSL/TLS Recommended Cipher Suites
Synopsis
Description
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to
only enable support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and
compatible with nearly every client released in the last five (or more) years.
See Also
https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/5432/postgresql
192.168.238.136 206
The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined
below:
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.238.136 207
25240 - Samba Server Detection
Synopsis
Description
The remote host is running Samba, a CIFS/SMB server for Linux and Unix.
See Also
https://www.samba.org/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445/cifs
192.168.238.136 208
104887 - Samba Version
Synopsis
It was possible to obtain the samba version from the remote operating system.
Description
Nessus was able to obtain the samba version from the remote operating by sending an authentication
request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445/cifs
192.168.238.136 209
96982 - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check)
Synopsis
Description
The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft
recommends that users discontinue the use of SMBv1 due to the lack of security features that were
included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that
affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-
CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.
See Also
https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-
smbv3-in-windows-and
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?234f8ef8
http://www.nessus.org/u?4c7e0cf3
Solution
Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB
directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block
TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
None
References
XREF IAVT:0001-T-0710
Plugin Information
Plugin Output
tcp/445/cifs
192.168.238.136 210
192.168.238.136 211
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/21/ftp
192.168.238.136 212
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
192.168.238.136 213
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/23/telnet
192.168.238.136 214
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
192.168.238.136 215
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
192.168.238.136 216
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/1524/wild_shell
192.168.238.136 217
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5900/vnc
192.168.238.136 218
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/8180/www
192.168.238.136 219
17975 - Service Detection (GET request)
Synopsis
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0935
Plugin Information
Plugin Output
tcp/6667/irc
192.168.238.136 220
11153 - Service Detection (HELP Request)
Synopsis
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends
when it receives a 'HELP'
request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3306/mysql
192.168.238.136 221
25220 - TCP/IP Timestamps Supported
Synopsis
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that
the uptime of the remote host can sometimes be computed.
See Also
http://www.ietf.org/rfc/rfc1323.txt
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.238.136 222
11819 - TFTP Daemon Detection
Synopsis
Description
The remote host is running a TFTP (Trivial File Transfer Protocol) daemon. TFTP is often used by routers and
diskless hosts to retrieve their configuration. It can also be used by worms to propagate.
Solution
Risk Factor
None
Plugin Information
Plugin Output
udp/69/tftp
192.168.238.136 223
110723 - Target Credential Status by Authentication Protocol - No Credentials Provided
Synopsis
Nessus was able to find common ports used for local checks, however, no credentials were provided in the
scan policy.
Description
Nessus was not able to successfully authenticate directly to the remote target on an available
authentication protocol. Nessus was able to connect to the remote port and identify that the service
running on the port supports an authentication protocol, but Nessus failed to authenticate to the
remote service using the provided credentials. There may have been a protocol failure that prevented
authentication from being attempted or all of the provided credentials for the authentication protocol may
be invalid. See plugin output for error details.
- This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and
not another. For example, authentication may succeed via SSH but fail via SMB, while no credentials were
provided for an available SNMP service.
- Providing valid credentials for all available authentication protocols may improve scan coverage, but the
value of successful authentication for a given protocol may vary from target to target depending upon what
data (if any) is gathered from the target via that protocol. For example, successful authentication via SSH is
more valuable for Linux targets than for Windows targets, and likewise successful authentication via SMB is
more valuable for Windows targets than for Linux targets.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0504
Plugin Information
Plugin Output
tcp/0
192.168.238.136 224
192.168.238.136 225
10281 - Telnet Server Detection
Synopsis
Description
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/23/telnet
192.168.238.136 226
10287 - Traceroute Information
Synopsis
Description
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/0
Hop Count: 1
192.168.238.136 227
11154 - Unknown Service Detection: Banner Retrieval
Synopsis
Description
Nessus was unable to identify a service on the remote host even though it returned a banner of some type.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/512
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to [email protected] :
Port : 512
Type : spontaneous
Banner :
0x00: 01 57 68 65 72 65 20 61 72 65 20 79 6F 75 3F 0A .Where are you?.
0x10:
192.168.238.136 228
11154 - Unknown Service Detection: Banner Retrieval
Synopsis
Description
Nessus was unable to identify a service on the remote host even though it returned a banner of some type.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/8787
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to [email protected] :
Port : 8787
Type : get_http
Banner :
0x0000: 00 00 00 03 04 08 46 00 00 03 A1 04 08 6F 3A 16 ......F......o:.
0x0010: 44 52 62 3A 3A 44 52 62 43 6F 6E 6E 45 72 72 6F DRb::DRbConnErro
0x0020: 72 07 3A 07 62 74 5B 17 22 2F 2F 75 73 72 2F 6C r.:.bt[."//usr/l
0x0030: 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F ib/ruby/1.8/drb/
0x0040: 64 72 62 2E 72 62 3A 35 37 33 3A 69 6E 20 60 6C drb.rb:573:in `l
0x0050: 6F 61 64 27 22 37 2F 75 73 72 2F 6C 69 62 2F 72 oad'"7/usr/lib/r
0x0060: 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 2E uby/1.8/drb/drb.
0x0070: 72 62 3A 36 31 32 3A 69 6E 20 60 72 65 63 76 5F rb:612:in `recv_
0x0080: 72 65 71 75 65 73 74 27 22 37 2F 75 73 72 2F 6C request'"7/usr/l
0x0090: 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F ib/ruby/1.8/drb/
0x00A0: 64 72 62 2E 72 62 3A 39 31 31 3A 69 6E 20 60 72 drb.rb:911:in `r
0x00B0: 65 63 76 5F 72 65 71 75 65 73 74 27 22 3C 2F 75 ecv_request'"</u
0x00C0: 73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F sr/lib/ruby/1.8/
0x00D0: 64 72 62 2F 64 72 62 2E 72 62 3A 31 35 33 30 3A drb/drb.rb:1530:
0x00E0: 69 6E 20 60 69 6E 69 74 5F 77 69 74 68 5F 63 6C in `init_with_cl
0x00F0: 69 65 6E 74 27 22 39 2F 75 73 72 2F 6C 69 62 2F ient'"9/usr/lib/
0x0100: 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 ruby/1.8/drb/drb
0x0110: 2E 72 62 3A 31 35 34 32 3A 69 6E 20 60 73 65 74 .rb:1542:in `set
0x0120: 75 70 5F 6D 65 73 73 61 67 65 27 22 33 2F 75 73 up_message'"3/us
0x0130: 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 r/lib/ruby/1.8/d
0x0140: 72 62 2F 64 72 62 2E 72 62 3A 31 34 39 34 [...]
192.168.238.136 229
20094 - VMware Virtual Machine Detection
Synopsis
Description
According to the MAC address of its network adapter, the remote host is a VMware virtual machine.
Solution
Since it is physically accessible through the network, ensure that its configuration matches your
organization's security policy.
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.238.136 230
19288 - VNC Server Security Type Detection
Synopsis
Description
This script checks the remote VNC server protocol version and the available 'security types'.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5900/vnc
192.168.238.136 231
65792 - VNC Server Unencrypted Communication Detection
Synopsis
A VNC server with one or more unencrypted 'security-types' is running on the remote host.
Description
This script checks the remote VNC server protocol version and the available 'security types' to determine if
any unencrypted 'security-types' are in use or available.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5900/vnc
2 (VNC authentication)
192.168.238.136 232
10342 - VNC Software Detection
Synopsis
Description
The remote host is running VNC (Virtual Network Computing), which uses the RFB (Remote Framebuffer)
protocol to provide remote access to graphical user interfaces and thus permits a console on the remote
host to be displayed on another.
See Also
https://en.wikipedia.org/wiki/Vnc
Solution
Make sure use of this software is done in accordance with your organization's security policy and filter
incoming traffic to this port.
Risk Factor
None
Plugin Information
Plugin Output
tcp/5900/vnc
3.3
192.168.238.136 233
135860 - WMI Not Available
Synopsis
Description
WMI (Windows Management Instrumentation) is not available on the remote host over DCOM. WMI
queries are used to gather information about the remote host, such as its current state, network interface
configuration, etc.
Without this information Nessus may not be able to identify installed software or security vunerabilities
that exist on the remote host.
See Also
https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-start-page
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445/cifs
192.168.238.136 234
20108 - Web Server / Application favicon.ico Vendor Fingerprinting
Synopsis
The remote web server contains a graphic image that is prone to information disclosure.
Description
The 'favicon.ico' file found on the remote web server belongs to a popular web server. This may be used to
fingerprint the web server.
Solution
Remove the 'favicon.ico' file or create a custom one for your site.
Risk Factor
None
Plugin Information
Plugin Output
tcp/8180/www
192.168.238.136 235
11422 - Web Server Unconfigured - Default Install Page Present
Synopsis
Description
The remote web server uses its default welcome page. Therefore, it's probable that this server is not used
at all or is serving content that is meant to be hidden.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/8180/www
192.168.238.136 236
11424 - WebDAV Detection
Synopsis
Description
Solution
http://support.microsoft.com/default.aspx?kbid=241520
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
192.168.238.136 237
10150 - Windows NetBIOS / SMB Remote Host Information Disclosure
Synopsis
Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB
requests.
Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/137/netbios-ns
This SMB server seems to be a Samba server - its MAC address is NULL.
192.168.238.136 238
52703 - vsftpd Detection
Synopsis
Description
The remote host is running vsftpd, an FTP server for UNIX-like systems written in C.
See Also
http://vsftpd.beasts.org/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/21/ftp
192.168.238.136 239