Vulnerability scans are performed using Nessus Professional. Some additional tools are also used to supplement the Nessus findings.


Overall risk (highest found): CRITICAL


Targetted systems

Number scanned: 161
Number with WAF: 1 (1%)
Down: 0
New: 0


View systems >>>

Vulnerability types in each risk class

Critical
2
High
10
Medium
35
Low
7
Info
2
CRITICAL2
HIGH10
MEDIUM35
LOW7
INFO2


View vulnerabilities >>>

Systems in each risk class

Critical
40
High
2
Medium
71
Low
4
Info
25
CRITICAL40
HIGH2
MEDIUM71
LOW4
INFO25


View systems >>>


Major Findings:

Risk RatingFinding
CRITICAL
The remote host contains an unsupported version of a web application scripting language.
CRITICAL
The operating system running on the remote host is no longer supported.
HIGH
The remote web server is affected by multiple vulnerabilities.
HIGH
The remote web server is affected by multiple vulnerabilities.
HIGH
The remote service encrypts traffic using a protocol with known weaknesses.
HIGH
The remote web server is affected by multiple vulnerabilities.
HIGH
The remote name server is affected by an assertion failure vulnerability.
HIGH
The remote Samba server is potentially affected by multiple vulnerabilities.
HIGH
The remote web server is affected by a vulnerability.
HIGH
The remote web server is affected by multiple vulnerabilities.
HIGH
The remote web server is affected by multiple vulnerabilities.
HIGH
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The remote web server is affected by a denial of service vulnerability.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
Debugging functions are enabled on the remote web server.
MEDIUM
The remote service encrypts traffic using an older version of TLS.
MEDIUM
The SSL certificate for this service cannot be trusted.
MEDIUM
An SSL certificate in the certificate chain has been signed using a weak hash algorithm.
MEDIUM
The remote name server is affected by a denial of service vulnerability.
MEDIUM
The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.
MEDIUM
The remote web server is affected by an information disclosure vulnerability.
MEDIUM
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The remote NTP server responds to mode 6 queries.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The version of PHP running on the remote web server is affected by multiple vulnerabilities.
MEDIUM
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
MEDIUM
The remote service supports the use of the RC4 cipher.
MEDIUM
The SSL certificate for this service is for a different host.
MEDIUM
The remote service supports the use of medium strength SSL ciphers.
MEDIUM
The remote host has IP forwarding enabled.
MEDIUM
Signing is not required on the remote SMB server.
MEDIUM
The version of PHP running on the remote web server is affected by an email header injection vulnerability.
MEDIUM
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The remote web server is affected by an information disclosure vulnerability.
MEDIUM
The remote server's SSL certificate has already expired.
MEDIUM
The remote web server is affected by an information disclosure vulnerability.
MEDIUM
The remote web server is affected by multiple cross site scripting vulnerability.
MEDIUM
The remote web server is affected by a vulnerability.
MEDIUM
The remote web server is affected by a vulnerability.
MEDIUM
The remote NTP server is affected by a denial of service vulnerability.
MEDIUM
The remote DNS server is vulnerable to cache snooping attacks.

View all vulnerabilities >>>

This table summarizes each of the detected vulnerabilities. Please use the drop down selector in the table header to switch between management summaries and detailed technical information.

ChangesRisk RatingReferences

CRITICAL

CVSS3:

10.0

CVSS:

10.0

The remote host contains an unsupported version of a web application scripting language.
Je nach Version wird die Installation von PHP auf dem Remote-Host nicht mehr unterstützt. Mangelnder Support bedeutet, dass vom Hersteller keine neuen Sicherheitspatches für das Produkt veröffentlicht werden. Infolgedessen ist es wahrscheinlich, dass es Sicherheitslücken enthält.
According to its version, the installation of PHP on the remote host is no longer supported.

Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.

Upgrade to a version of PHP that is currently supported.

Finding IDAffected System
356172.21.17.13
357172.21.17.14
172.21.221.31

CVE:

N/A

CWE:

N/A

VPR:

N/A

CRITICAL

CVSS3:

10.0

CVSS:

10.0

The operating system running on the remote host is no longer supported.
According to its self-reported version number, the Unix operating system running on the remote host is no longer supported.

Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.

Upgrade to a version of the Unix operating system that is currently supported.

Finding IDAffected System
157172.21.0.2
158172.21.0.16
160172.21.11.121
163172.21.172.146
164172.21.173.11
172.21.198.230
172.21.220.11
167172.21.220.12
169172.21.221.9
172.21.221.26
172.21.221.45
172.21.221.52
173172.21.221.53
174172.21.221.54
172.21.221.55
172.21.221.56
178172.21.221.59
179172.21.221.61
180172.21.221.62
182172.21.221.65
183172.21.221.66
184172.21.221.67
185172.21.221.68
186172.21.221.69
187172.21.221.70
188172.21.221.71
189172.21.221.72
190172.21.221.73
191172.21.221.74
192172.21.221.76
193172.21.221.78
194172.21.221.162
195172.21.221.211
196172.21.221.233
197172.21.221.240
198172.21.221.241
199172.21.221.243

CVE:

N/A

CWE:

N/A

VPR:

N/A

HIGH

CVSS3:

8.8

CVSS:

9.0

The remote Samba server is potentially affected by multiple vulnerabilities.
Die Version von Samba, die auf dem Remote-Host eingesetzt wird, ist 4.13.x vor 4.13.17, 4.14.x vor 4.14.12 oder 4.15.x vor 4.15.5. Es ist daher von mehreren Schwachstellen betroffen: 1. Out-of-Bounds Heap-Lese-/Schreibschwachstelle im VFS-Modul vfs_fruit die die Ausführung von Code ermöglicht. (CVE-2021-44142); 2. Informationsleck über Symlinks über die Existenz von Dateien oder Verzeichnissen außerhalb der exportierten Freigabe. (CVE-2021-44141); 3. Samba AD-Benutzer mit der Berechtigung, in ein Konto zu schreiben, können sich als beliebige Dienste ausgeben (CVE-2022-0336). Beachten Sie, dass Nessus nicht auf diese Probleme getestet hat, sondern sich nur auf die selbst gemeldete Versionsnummer der Anwendung verlassen hat.
The version of Samba running on the remote host is 4.13.x prior to 4.13.17, 4.14.x prior to 4.14.12, or 4.15.x prior to 4.15.5.  It is, therefore, affected by multiple vulnerabilities:

  - Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution. (CVE-2021-44142)

  - Information leak via symlinks of existence of	files or directories outside of the exported share. (CVE-2021-44141)

  - Samba AD users with permission to write to an account can impersonate arbitrary services. (CVE-2022-0336)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Samba version 4.13.17, 4.14.12, or 4.15.5 or later.

Finding IDAffected System
810172.21.21.11

CVE:

CVE-2021-44141

CVE-2021-44142

CVE-2022-0336

CWE:

N/A

VPR:

8.4

HIGH

CVSS3:

7.5

CVSS:

7.8

The remote name server is affected by an assertion failure vulnerability.
A denial of service (DoS) vulnerability exists in ISC BIND versions 9.11.18 / 9.11.18-S1 / 9.12.4-P2 / 9.13 / 9.14.11 / 9.15 / 9.16.2 / 9.17 / 9.17.1 and earlier. An unauthenticated, remote attacker can exploit this issue, via a specially-crafted message, to cause the service to stop responding.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to the patched release most closely related to your current version of BIND.

Finding IDAffected System
639172.21.0.16

CVE:

CVE-2020-8617

CWE:

N/A

VPR:

5.1

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by multiple vulnerabilities.
Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.47. Es ist daher von mehreren Schwachstellen betroffen, auf die im Changelog 2.4.47 verwiesen wird. (CVE-2021-30641, CVE-2020-35452, CVE-2021-26691, CVE-2021-26690, CVE-2020-13950, CVE-2020-13938, CVE-2019-17567) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is prior to 2.4.47. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.47 changelog:

  - Unexpected <Location> section matching with 'MergeSlashes OFF' (CVE-2021-30641)

  - mod_auth_digest: possible stack overflow by one nul byte while validating the Digest nonce. (CVE-2020-35452)

  - mod_session: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service     with a malicious backend server and SessionHeader. (CVE-2021-26691)

  - mod_session: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service.
    (CVE-2021-26690)

  - mod_proxy_http: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of     Service. (CVE-2020-13950)

  - Windows: Prevent local users from stopping the httpd process (CVE-2020-13938)

  - mod_proxy_wstunnel, mod_proxy_http: Handle Upgradable protocols end-to-end negotiation. (CVE-2019-17567)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.47 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2019-17567

CVE-2020-13938

CVE-2020-13950

CVE-2020-35452

CVE-2021-26690

CVE-2021-26691

CVE-2021-30641

CWE:

N/A

VPR:

6.7

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by a vulnerability.
Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.49. Es ist daher von mehreren Schwachstellen betroffen, auf die im Changelog 2.4.49 verwiesen wird. (CVE-2021-39275, CVE-2021-34798) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is prior to 2.4.49. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.49 changelog.

  - ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass     untrusted data to these functions, but third-party / external modules may. (CVE-2021-39275)

  - Malformed requests may cause the server to dereference a NULL pointer. (CVE-2021-34798)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.49 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2021-34798

CVE-2021-39275

CWE:

N/A

VPR:

6.7

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by multiple vulnerabilities.
Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.52. Es ist daher von mehreren Sicherheitsanfälligkeiten betroffen, auf die in der Empfehlung 2.4.52 verwiesen wird. (CVE-2021-44224, CVE-2021-44790) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is prior to 2.4.52. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.52 advisory.

  - A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL     pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for     requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This     issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). (CVE-2021-44224)

  - A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser     (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the     vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and     earlier. (CVE-2021-44790)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.52 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2021-44224

CVE-2021-44790

CWE:

N/A

VPR:

9.0

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by multiple vulnerabilities.
Die auf dem Remote-Host installierte Version von Apache httpd liegt vor 2.4.53. Es ist daher von mehreren Sicherheitsanfälligkeiten betroffen, auf die in der Empfehlung 2.4.53 verwiesen wird. (CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is prior to 2.4.53. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.53 advisory.

  - mod_lua Use of uninitialized value of in r:parsebodyA carefully crafted request body can cause a read to a     random memory area which could cause the process to crash.  This issue affects Apache HTTP Server 2.4.52     and earlier. Acknowledgements: Chamal De Silva (CVE-2022-22719)

  - HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlierApache HTTP Server 2.4.52 and     earlier fails to close inbound connection when errors are encountered discarding the request body,     exposing the server to HTTP Request Smuggling Acknowledgements: James Kettle <james.kettle     portswigger.net> (CVE-2022-22720)

  - core: Possible buffer overflow with very large or unlimited LimitXMLRequestBodyIf LimitXMLRequestBody is     set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow     happens which later causes out of bounds writes.  This issue affects Apache HTTP Server 2.4.52 and     earlier. Acknowledgements: Anonymous working with Trend Micro Zero Day Initiative (CVE-2022-22721)

  - mod_sed: Read/write beyond boundsOut-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows     an attacker to overwrite heap memory with possibly attacker provided data.  This issue affects Apache HTTP     Server 2.4 version 2.4.52 and prior versions. Acknowledgements: Ronald Crane (Zippenhop LLC)     (CVE-2022-23943)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.53 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2022-22719

CVE-2022-22720

CVE-2022-22721

CVE-2022-23943

CWE:

N/A

VPR:

5.9

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.2.x prior to 2.2.33-dev or 2.4.x prior to 2.4.26. It is, therefore, affected by the following vulnerabilities :

  - An authentication bypass vulnerability exists due to     third-party modules using the ap_get_basic_auth_pw()     function outside of the authentication phase. An     unauthenticated, remote attacker can exploit this to     bypass authentication requirements. (CVE-2017-3167)

  - A NULL pointer dereference flaw exists due to     third-party module calls to the mod_ssl     ap_hook_process_connection() function during an HTTP     request to an HTTPS port. An unauthenticated, remote     attacker can exploit this to cause a denial of service     condition. (CVE-2017-3169)

  - A NULL pointer dereference flaw exists in mod_http2 that     is triggered when handling a specially crafted HTTP/2     request. An unauthenticated, remote attacker can exploit     this to cause a denial of service condition. Note that     this vulnerability does not affect 2.2.x.
    (CVE-2017-7659)

  - An out-of-bounds read error exists in the     ap_find_token() function due to improper handling of     header sequences. An unauthenticated, remote attacker     can exploit this, via a specially crafted header     sequence, to cause a denial of service condition.
    (CVE-2017-7668)

  - An out-of-bounds read error exists in mod_mime due to     improper handling of Content-Type response headers. An     unauthenticated, remote attacker can exploit this, via a     specially crafted Content-Type response header, to cause     a denial of service condition or the disclosure of     sensitive information. (CVE-2017-7679)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2017-3167

CVE-2017-3169

CVE-2017-7659

CVE-2017-7668

CVE-2017-7679

CWE:

N/A

VPR:

6.7

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by multiple vulnerabilities.
The version of Apache httpd installed on the remote host is prior to 2.4.46. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.46 advisory.

  - Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info     disclosure and possible RCE (CVE-2020-11984)

  - Apache HTTP Server versions 2.4.20 to 2.4.43 When     trace/debug was enabled for the HTTP/2 module and on     certain traffic edge patterns, logging statements were     made on the wrong connection, causing concurrent use of     memory pools. Configuring the LogLevel of mod_http2     above info will mitigate this vulnerability for     unpatched servers. (CVE-2020-11993)

  - Apache HTTP Server versions 2.4.20 to 2.4.43. A     specially crafted value for the 'Cache-Digest' header in     a HTTP/2 request would result in a crash when the server     actually tries to HTTP/2 PUSH a resource afterwards.
    Configuring the HTTP/2 feature via H2Push off will     mitigate this vulnerability for unpatched servers.
    (CVE-2020-9490)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.46 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2020-9490

CVE-2020-11984

CVE-2020-11993

CWE:

N/A

VPR:

8.4

HIGH

CVSS3:

7.8

CVSS:

7.2

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.39. It is, therefore, affected by multiple vulnerabilities:

  - A privilege escalation vulnerability exists in     module scripts due to an ability to execute arbitrary     code as the parent process by manipulating the     scoreboard. (CVE-2019-0211)

  - An access control bypass vulnerability exists in     mod_auth_digest due to a race condition when running     in a threaded server. An attacker with valid credentials     could authenticate using another username. (CVE-2019-0217)

  - An access control bypass vulnerability exists in     mod_ssl when using per-location client certificate     verification with TLSv1.3. (CVE-2019-0215)

In addition, Apache httpd is also affected by several additional vulnerabilities including a denial of service, read-after-free and URL path normalization inconsistencies. 

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.39 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2019-0196

CVE-2019-0197

CVE-2019-0211

CVE-2019-0215

CVE-2019-0217

CVE-2019-0220

CWE:

N/A

VPR:

7.4

HIGH

CVSS3:

7.5

CVSS:

7.1

The remote service encrypts traffic using a protocol with known weaknesses.
Der Remotedienst akzeptiert Verbindungen, die mit SSL 2.0 und/oder SSL 3.0 verschlüsselt wurden. Diese Versionen von SSL sind von mehreren kryptografischen Fehlern betroffen, darunter: 1. Ein unsicheres Auffüllungsschema mit CBC-Chiffren; 2. Unsichere Neuverbindungen und Wiederaufnahme einer Session. Ein Angreifer kann diese Fehler ausnutzen, um Man-in-the-Middle-Angriffe durchzuführen oder die Kommunikation zwischen dem betroffenen Dienst und Clients zu entschlüsseln. Obwohl SSL/TLS über ein sicheres Mittel zur Auswahl der am höchsten unterstützten Version des Protokolls verfügt (so dass diese Versionen nur verwendet werden, wenn der Client oder Server nichts Besseres unterstützt), implementieren viele Webbrowser dies auf eine unsichere Weise, die es einem Angreifer ermöglicht, eine Verbindung herunterzustufen (z. B. in POODLE). Daher wird empfohlen, diese Protokolle vollständig zu deaktivieren. NIST hat festgestellt, dass SSL 3.0 für eine sichere Kommunikation nicht mehr akzeptabel ist. Ab dem Datum der Durchsetzung in PCI DSS v3.1 entspricht keine SSL-Version der Definition von PCI SSC für "starke Kryptografie".
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including:

  - An insecure padding scheme with CBC ciphers.

  - Insecure session renegotiation and resumption schemes.

An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.

Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely.

NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'.

Consult the application's documentation to disable SSL 2.0 and 3.0. Use TLS 1.2 (with approved cipher suites) or higher instead.

Finding IDAffected System
149172.21.221.211

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

9.8

CVSS:

6.8

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.33. It is, therefore, affected by multiple vulnerabilities:

  - An out of bounds write vulnerability exists in mod_authnz_ldap     with AuthLDAPCharsetConfig enabled. An unauthenticated, remote     attacker can exploit this, via the Accept-Language header value,     to cause the application to stop responding. (CVE-2017-15710)  
  - An arbitrary file upload vulnerability exists in the FilesMatch     component where a malicious filename can be crafted to match the     expression check for a newline character. An unauthenticated,     remote attacker can exploit this, via newline character, to     upload arbitrary files on the remote host subject to the     privileges of the user. (CVE-2017-15715)

  - A session management vulnerability exists in the     mod_session component due to SessionEnv being enabled and     forwarding it's session data to the CGI Application. An     unauthenticated, remote attacker can exploit this, via     tampering the HTTP_SESSION and using a session header, to     influence content. (CVE-2018-1283)

  - An out of bounds access vulnerability exists when the size limit     is reached. An unauthenticated, remote attacker can exploit this,     to cause the Apache HTTP Server to crash. (CVE-2018-1301)

  - A write after free vulnerability exists in HTTP/2 stream due to     a NULL pointer being written to an area of freed memory. An     unauthenticated, remote attacker can exploit this to execute     arbitrary code. (CVE-2018-1302)   
  - An out of bounds read vulnerability exists in mod_cache_socache.
    An unauthenticated, remote attacker can exploit this, via a     specially crafted HTTP request header to cause the application     to stop responding. (CVE-2018-1303)

  - A weak digest vulnerability exists in the HTTP digest     authentication challenge.  An unauthenticated, remote attacker     can exploit this in a cluster of servers configured to use a     common digest authentication, to replay HTTP requests across     servers without being detected. (CVE-2018-1312)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.33 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2017-15710

CVE-2017-15715

CVE-2018-1283

CVE-2018-1301

CVE-2018-1302

CVE-2018-1303

CVE-2018-1312

CWE:

N/A

VPR:

7.4

MEDIUM

CVSS3:

9.0

CVSS:

6.8

The remote web server is affected by a vulnerability.
Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.49. Es ist daher von mehreren Schwachstellen betroffen, auf die im Changelog 2.4.49 verwiesen wird. (CVE-2021-39275, CVE-2021-34798) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is prior to 2.4.49. It is, therefore, affected by a vulnerability as referenced in the 2.4.49 changelog.

  - A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the   remote user. (CVE-2021-40438)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.49 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2021-40438

CWE:

N/A

VPR:

10.0

MEDIUM

CVSS3:

9.1

CVSS:

6.4

The remote web server is affected by multiple vulnerabilities.
The version of Apache httpd installed on the remote host is prior to 2.4.41. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.41 advisory, including the following:

  - A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could     cause the link on the error page to be malformed and instead point to a page of their choice. This would     only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way     that the Proxy Error page was displayed. (CVE-2019-10092)

  - HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with H2PushResource, could lead     to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that     of the configured push link header values, not data supplied by the client. (CVE-2019-10081)

  - Some HTTP/2 implementations are vulnerable to unconstrained internal data buffering, potentially leading     to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint;
    however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the     wire. The attacker then sends a stream of requests for a large response object. Depending on how the     servers queue the responses, this can consume excess memory, CPU, or both. (CVE-2019-9517)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.41 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2019-9517

CVE-2019-10081

CVE-2019-10082

CVE-2019-10092

CVE-2019-10097

CVE-2019-10098

CWE:

N/A

VPR:

5.9

MEDIUM

CVSS3:

6.5

CVSS:

6.4

The SSL certificate for this service cannot be trusted.
Das X.509 Zertifikat des Servers ist nicht vertrauenswürdig. Dies kann zum Beispiel daran liegen, dass das Zertifikat ein Selbst-signiertes ist oder die Informationen des Zertifikats passen nicht zu der eingesetzten Domain.
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :

  - First, the top of the certificate chain sent by the     server might not be descended from a known public     certificate authority. This can occur either when the     top of the chain is an unrecognized, self-signed     certificate, or when intermediate certificates are     missing that would connect the top of the certificate     chain to a known public certificate authority.

  - Second, the certificate chain may contain a certificate     that is not valid at the time of the scan. This can     occur either when the scan occurs before one of the     certificate's 'notBefore' dates, or after one of the     certificate's 'notAfter' dates.

  - Third, the certificate chain may contain a signature     that either didn't match the certificate's information     or could not be verified. Bad signatures can be fixed by     getting the certificate with the bad signature to be     re-signed by its issuer. Signatures that could not be     verified are the result of the certificate's issuer     using a signing algorithm that Nessus either does not     support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.

Purchase or generate a proper SSL certificate for this service.

Finding IDAffected System
172.21.11.11
229172.21.11.12
230172.21.11.14
231172.21.11.15
172.21.11.20
234172.21.11.22
235172.21.11.121
236172.21.11.122
237172.21.11.145
238172.21.11.221
239172.21.11.230
172.21.11.250
245172.21.172.24
247172.21.172.45
249172.21.172.100
250172.21.172.105
251172.21.172.106
252172.21.172.146
253172.21.172.240
254172.21.173.11
255172.21.173.111
256172.21.173.112
257172.21.173.121
258172.21.174.31
260172.21.174.33
172.21.198.5
172.21.198.31
172.21.198.230
264172.21.199.19
172.21.199.201
172.21.220.11
268172.21.220.12
172.21.221.45
270172.21.221.53
271172.21.221.54
172.21.221.56
273172.21.221.58
274172.21.221.59
275172.21.221.61
276172.21.221.62
277172.21.221.64
278172.21.221.65
279172.21.221.66
280172.21.221.67
281172.21.221.68
282172.21.221.69
283172.21.221.70
284172.21.221.71
285172.21.221.72
286172.21.221.73
287172.21.221.74
172.21.221.76
290172.21.221.78
291172.21.221.162
292172.21.221.211
293172.21.221.238
294172.21.221.250

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

9.1

CVSS:

6.4

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.27. It is, therefore, affected by the following vulnerabilities :

  - A denial of service vulnerability exists in httpd due to     a failure to initialize or reset the value placeholder     in [Proxy-]Authorization headers of type 'Digest' before     or between successive key=value assignments by     mod_auth_digest. An unauthenticated, remote attacker can     exploit this, by providing an initial key with no '='     assignment, to disclose sensitive information or cause a     denial of service condition. (CVE-2017-9788)

  - A read-after-free error exists in httpd that is     triggered when closing a large number of connections. An     unauthenticated, remote attacker can exploit this to     have an unspecified impact. (CVE-2017-9789)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.27 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2017-9788

CVE-2017-9789

CWE:

N/A

VPR:

6.0

MEDIUM

CVSS3:

N/A

CVSS:

6.4

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Die X.509-Zertifikatkette für den HTTPS-Dienst ist nicht von einer anerkannten Zertifizierungsstelle signiert. Wenn der betroffene Host öffentlich in der Produktion ist, wird die sichere Verwendung von SSL ausgehebelt, da ein Man-in-the-Middle-Angriff wieder möglich wird.
The X.509 certificate chain for this service is not signed by a recognized certificate authority.  If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. 

Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.

Purchase or generate a proper SSL certificate for this service.

Finding IDAffected System
295172.21.11.11
297172.21.11.22
298172.21.11.121
299172.21.11.122
300172.21.11.230
172.21.11.250
307172.21.172.45
309172.21.172.100
310172.21.172.105
311172.21.172.106
312172.21.172.146
313172.21.172.240
314172.21.173.11
315172.21.173.111
316172.21.173.112
317172.21.173.121
318172.21.174.31
320172.21.174.33
172.21.198.230
322172.21.199.19
172.21.220.11
325172.21.220.12
172.21.221.45
327172.21.221.53
328172.21.221.54
172.21.221.56
330172.21.221.58
331172.21.221.59
332172.21.221.61
333172.21.221.62
334172.21.221.64
335172.21.221.65
336172.21.221.66
337172.21.221.67
338172.21.221.68
339172.21.221.69
340172.21.221.70
341172.21.221.71
342172.21.221.72
343172.21.221.73
344172.21.221.74
172.21.221.76
347172.21.221.78
348172.21.221.162
349172.21.221.211
350172.21.221.238
351172.21.221.250

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

6.5

CVSS:

6.1

The remote service encrypts traffic using an older version of TLS.
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible.

As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.

PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

Finding IDAffected System
509172.21.11.11
510172.21.11.12
511172.21.11.14
512172.21.11.15
172.21.11.20
515172.21.11.22
516172.21.11.121
517172.21.11.122
518172.21.11.145
519172.21.11.230
520172.21.11.250
524172.21.172.37
525172.21.172.45
527172.21.172.100
528172.21.172.105
529172.21.172.106
530172.21.172.146
531172.21.172.240
532172.21.173.11
533172.21.173.111
534172.21.173.112
535172.21.173.121
536172.21.174.31
538172.21.174.33
172.21.198.5
172.21.198.230
541172.21.199.19
172.21.199.201
172.21.220.11
544172.21.220.12
172.21.221.45
546172.21.221.53
547172.21.221.54
172.21.221.56
549172.21.221.58
550172.21.221.59
551172.21.221.61
552172.21.221.62
553172.21.221.64
554172.21.221.65
555172.21.221.66
556172.21.221.67
557172.21.221.68
558172.21.221.69
559172.21.221.70
560172.21.221.71
561172.21.221.72
562172.21.221.73
563172.21.221.74
564172.21.221.76
565172.21.221.78
566172.21.221.162
567172.21.221.211
568172.21.221.238
569172.21.221.250

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

6.5

CVSS:

5.8

The remote host has IP forwarding enabled.
Auf dem Remotehost ist die IP-Weiterleitung aktiviert. Ein Angreifer kann dies ausnutzen, um Pakete durch den Host zu leiten und möglicherweise einige Firewalls / Router zu umgehen. Sofern es sich bei dem Remotehost nicht um einen Router handelt, wird empfohlen, die IP-Weiterleitung zu deaktivieren.
The remote host has IP forwarding enabled. An attacker can exploit this to route packets through the host and potentially bypass some firewalls / routers / NAC filtering.

Unless the remote host is a router, it is recommended that you disable IP forwarding.

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

Finding IDAffected System
214172.21.172.21
216172.21.172.45
217172.21.172.46
218172.21.172.47
219172.21.172.100
220172.21.172.101
221172.21.172.105
222172.21.172.106
223172.21.172.146
224172.21.172.147
225172.21.172.200
226172.21.172.240

CVE:

CVE-1999-0511

CWE:

N/A

VPR:

4.0

MEDIUM

CVSS3:

6.1

CVSS:

5.8

The remote web server is affected by multiple vulnerabilities.
The version of Apache httpd installed on the remote host is prior to 2.4.42. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.42 advisory.

  - In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may     use uninitialized memory when proxying to a malicious     FTP server. (CVE-2020-1934)

  - In Apache HTTP Server 2.4.0 to 2.4.41, redirects     configured with mod_rewrite that were intended to be     self-referential might be fooled by encoded newlines and     redirect instead to an unexpected URL within the     request URL. (CVE-2020-1927)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.42 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2020-1927

CVE-2020-1934

CWE:

N/A

VPR:

3.8

MEDIUM

CVSS3:

7.5

CVSS:

5.0

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service.

Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm.

Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been ignored.

Contact the Certificate Authority to have the SSL certificate reissued.

Finding IDAffected System
201172.21.11.11
202172.21.11.230
203172.21.11.250
206172.21.221.211

CVE:

CVE-2004-2761

CWE:

310

VPR:

6.1

MEDIUM

CVSS3:

8.6

CVSS:

5.0

The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.
According to its self-reported version, the instance of ISC BIND 9 running on the remote name server is affected by performance downgrade and Reflected DoS vulnerabilities. This is due to BIND DNS not sufficiently limiting the number fetches which may be performed while processing a referral response.

An unauthenticated, remote attacker can exploit this to cause degrade the service of the recursive server or to use the affected server as a reflector in a reflection attack.

Upgrade to the ISC BIND version referenced in the vendor advisory.

Finding IDAffected System
637172.21.0.16

CVE:

CVE-2020-8616

CWE:

N/A

VPR:

5.2

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.34. It is, therefore, affected by the following vulnerabilities:

  - By specially crafting HTTP/2 requests, workers would be     allocated 60 seconds longer than necessary, leading to     worker exhaustion and a denial of service. (CVE-2018-1333)

  - By specially crafting HTTP requests, the mod_md challenge     handler would dereference a NULL pointer and cause the     child process to segfault. This could be used to DoS the     server. (CVE-2018-8011)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.34 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2018-1333

CVE-2018-8011

CWE:

N/A

VPR:

3.6

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.28. It is, therefore, affected by an HTTP vulnerability related to the <Limit {method}> directive in an .htaccess file.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.28 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2017-9798

CWE:

N/A

VPR:

6.1

MEDIUM

CVSS3:

5.3

CVSS:

5.0

Debugging functions are enabled on the remote web server.
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are used to debug web server connections.

Disable these HTTP methods. Refer to the plugin output for more information.

Finding IDAffected System
172.21.11.12
172.21.221.211

CVE:

CVE-2003-1567

CVE-2004-2320

CVE-2010-0386

CWE:

16

200

VPR:

4.0

MEDIUM

CVSS3:

5.3

CVSS:

5.0

The remote DNS server is vulnerable to cache snooping attacks.
The remote DNS server responds to queries for third-party domains that do not have the recursion bit set. 

This may allow a remote attacker to determine which domains have recently been resolved via this name server, and therefore which hosts have been recently visited. 

For instance, if an attacker was interested in whether your company utilizes the online services of a particular financial institution, they would be able to use this attack to build a statistical model regarding company usage of that financial institution.  Of course, the attack can also be used to find B2B partners, web-surfing patterns, external mail servers, and more.

Note: If this is an internal DNS server not accessible to outside networks, attacks would be limited to the internal network. This may include employees, consultants and potentially users on a guest network or WiFi connection if supported.

Contact the vendor of the DNS software for a fix.

Finding IDAffected System
133172.21.0.2
134172.21.0.16
136172.21.11.5
172.21.198.5

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.38. It is, therefore, affected by multiple vulnerabilities:

  - A denial of service (DoS) vulnerability exists in HTTP/2 steam     handling. An unauthenticated, remote attacker can exploit this     issue, via sending request bodies in a slow loris way to plain     resources, to occupy a server thread. (CVE-2018-17189)

  - A vulnerability exists in mod_sesion_cookie, as it does not     properly check the expiry time of cookies. (CVE-2018-17199) 

  - A denial of service (DoS) vulnerability exists in mod_ssl when     used with OpenSSL 1.1.1 due to an interaction in changes to     handling of renegotiation attempts. An unauthenticated, remote     attacker can exploit this issue to cause mod_ssl to stop     responding. (CVE-2019-0190)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.38 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2018-17189

CVE-2018-17199

CVE-2019-0190

CWE:

N/A

VPR:

3.6

MEDIUM

CVSS3:

5.8

CVSS:

5.0

The remote NTP server responds to mode 6 queries.
Der vom Server eingesetzte NTP Dienst weist eine Schwachstelle auf, die von Angreifern für eine Denial of Service Attacke genutzt werden kann. Der Dienst sollte umkonfiguriert werden, um dies zu verhindern.
The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.

Restrict NTP mode 6 queries.

Finding IDAffected System
502172.21.221.250

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote NTP server is affected by a denial of service vulnerability.
In der Version von ntpd, die auf dem Remote-Host ausgeführt wird, ist der Befehl "monlist" aktiviert. Dieser Befehl gibt eine Liste mit IP-Adressen zurück, die eine Verbindung mit dem Dienst hergestellt haben. Diese Version des ntpd ist verwundbar und ermöglicht einem nicht authentifizierten Remoteangreifer, den Netzwerkverkehr mithilfe gefälschter Anfragen zu manipulieren. Darüber hinaus kann ein Angreifer dieses Problem ausnutzen, um Aufklärungs- oder Distributed-Denial-of-Service-Angriffe (DDoS) durchzuführen.
The version of ntpd running on the remote host has the 'monlist' command enabled. This command returns a list of recent hosts that have connected to the service. However, it is affected by a denial of service vulnerability in ntp_request.c that allows an unauthenticated, remote attacker to saturate network traffic to a specific IP address by using forged REQ_MON_GETLIST or REQ_MON_GETLIST_1 requests.
Furthermore, an attacker can exploit this issue to conduct reconnaissance or distributed denial of service (DDoS) attacks.

If using NTP from the Network Time Protocol Project, upgrade to NTP version 4.2.7-p26 or later. Alternatively, add 'disable monitor' to the ntp.conf configuration file and restart the service. Otherwise, limit access to the affected service to trusted hosts, or contact the vendor for a fix.

Finding IDAffected System
436172.21.221.250

CVE:

CVE-2013-5211

CWE:

N/A

VPR:

4.4

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The version of PHP running on the remote web server is affected by multiple vulnerabilities.
Gemäß der selbst gemeldeten Versionsnummer liegt die php-Version, die auf dem Remote-Webserver ausgeführt wird, vor 7.3.24. Es ist daher von mehreren Schwachstellen betroffen.
According to its self-reported version number, the version of PHP running on the remote web server is prior to 7.3.24. It is, therefore affected by multiple vulnerabilities

Upgrade to PHP version 7.3.24 or later.

Finding IDAffected System
172.21.17.13
172.21.17.14
172.21.221.31

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

5.3

CVSS:

5.0

The SSL certificate for this service is for a different host.
Das Attribut 'commonName' (CN) des SSL-Zertifikats ist nicht für den angebotenen Dienst ausgestellt.
The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.

Purchase or generate a proper SSL certificate for this service.

Finding IDAffected System
213172.21.199.19

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote web server is affected by a vulnerability.
Die auf dem Remote-Host installierte Version von Apache httpd ist größer als 2.4.17 und kleiner 2.4.49. Es ist daher von einer Schwachstelle betroffen, auf die im Changelog 2.4.49 verwiesen wird. Eine gestaltete Methode, die über HTTP/2 gesendet wird, umgeht die Validierung und wird von mod_proxy weitergeleitet, was zu Anforderungsaufteilung oder Cache-Poisoning führen kann. Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is greater than 2.4.17 and prior to 2.4.49. It is, therefore, affected by a vulnerability as referenced in the 2.4.49 changelog. A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.49 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2021-33193

CWE:

N/A

VPR:

5.1

MEDIUM

CVSS3:

5.3

CVSS:

5.0

Signing is not required on the remote SMB server.
Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.

Finding IDAffected System
352172.21.21.11
353172.21.199.211

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

5.3

CVSS:

5.0

The version of PHP running on the remote web server is affected by an email header injection vulnerability.
Gemäß der selbst angegebenen Versionsnummer liegt die php-Version, die auf dem Remote-Webserver ausgeführt wird, vor 7.3.28. Es ist daher von einer E-Mail-Header-Injection-Schwachstelle betroffen, die auf ein Versäumnis zurückzuführen ist, die CR-LF-Sequenzen in Header-Feldern ordnungsgemäß zu verarbeiten. Ein nicht authentifizierter, entfernter Angreifer kann dies ausnutzen, indem er Zeilenvorschubzeichen in E-Mail-Header einfügt, um die volle Kontrolle über den Inhalt von E-Mail-Headern zu erhalten.
According to its self-reported version number, the version of PHP running on the remote web server is prior to 7.3.28.
It is, therefore affected by an email header injection vulnerability, due to a failure to properly handle CR-LF sequences in header fields. An unauthenticated, remote attacker can exploit this, by inserting line feed characters into email headers, to gain full control of email header content.

Upgrade to PHP version 7.3.28 or later.

Finding IDAffected System
172.21.17.13
172.21.17.14
172.21.221.31

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote service supports the use of medium strength SSL ciphers.
Auf dem Webserver verwendete Verfahren erlauben Zugriff auf einige Sicherungsdateien. Es sollte sichergestellt werden, daß diese keine sensitiven Informationen enthalten, wie Passwörter für Datenbanken. Nicht benötigte Dateien sollten gelöscht werden.
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

Finding IDAffected System
209172.21.199.19
172.21.220.11
211172.21.221.76
212172.21.221.211

CVE:

CVE-2016-2183

CWE:

N/A

VPR:

4.4

MEDIUM

CVSS3:

5.3

CVSS:

5.0

The remote server's SSL certificate has already expired.
Das vom Webdienst verwendete SSL Zertifikat ist nicht mehr gültig. Der Dienst sollte umgehend konfiguriert und ein neues Zertifikat verwendet werden.
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.

Purchase or generate a new SSL certificate to replace the existing one.

Finding IDAffected System
172.21.11.145
145172.21.172.24
172.21.199.201
172.21.220.11
147172.21.221.76
148172.21.221.211

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

5.3

CVSS:

5.0

The remote web server is affected by an information disclosure vulnerability.
The Apache web server running on the remote host is affected by an information disclosure vulnerability. An unauthenticated, remote attacker can exploit this, by sending a crafted request, to display a listing of a remote directory, even if a valid index file exists in the directory.

For Apache web server later than 1.3.22, review listing directory configuration to avoid disclosing sensitive information

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

Finding IDAffected System
804172.21.11.145
172.21.11.250
172.21.172.105
127172.21.172.146

CVE:

CVE-2001-0731

CWE:

N/A

VPR:

2.2

MEDIUM

CVSS3:

5.3

CVSS:

4.3

The remote web server is affected by an information disclosure vulnerability.
Laut dem Server-Antwort-Header liegt die installierte Version von nginx vor 1.17.7. Es ist daher von einer Schwachstelle zur Offenlegung von Informationen betroffen.
According to its Server response header, the installed version of nginx is prior to 1.17.7. It is, therefore, affected by an information disclosure vulnerability.

Upgrade to nginx version 1.17.7 or later.

Finding IDAffected System
172.21.11.221
624172.21.198.20
625172.21.198.21
172.21.198.22
627172.21.198.23
172.21.198.31
172.21.198.110
172.21.198.111
631172.21.198.112
172.21.198.113
172.21.198.250
172.21.198.251

CVE:

CVE-2019-20372

CWE:

N/A

VPR:

1.4

MEDIUM

CVSS3:

3.7

CVSS:

4.3

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.
Die Webanwendung auf dem Remote-Host ist von einer Cross-Site-Scripting-Schwachstelle betroffen, die auf eine anfällige Version von Apache Struts 2 zurückzuführen ist, die die Parameter in den Tags "s:a" und "s:url" nicht richtig kodiert. Ein entfernter Angreifer kann dies ausnutzen, indem er einen Benutzer dazu verleitet, eine Seite mit beliebigem Skriptcode anzufordern. Dies kann Konsequenzen haben, z. B. gestohlene Anmeldeinformationen für die Authentifizierung.
The web application on the remote host is affected by a cross-site scripting vulnerability due to a vulnerable version of Apache Struts 2 that fails to properly encode the parameters in the 's:a' and 's:url' tags.

A remote attacker can exploit this by tricking a user into requesting a page with arbitrary script code injected. This could have consequences such as stolen authentication credentials.

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

Finding IDAffected System
172.21.17.11
172.21.17.12
172.21.17.13
172.21.17.14

CVE:

CVE-2008-6682

CWE:

79

VPR:

1.4

MEDIUM

CVSS3:

6.8

CVSS:

4.3

It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
Der Remotehost ist von einer Man-in-the-Middle-Angriff (MitM) betroffen, die als POODLE bezeichnet wird. Die Sicherheitsanfälligkeit ist auf die Art und Weise zurückzuführen, wie SSL 3.0 beim Entschlüsseln von Nachrichten, die mit Blockchiffren verschlüsselt wurden, im CBC-Modus (Cipher Block Chaining, Verschlüsselung) verarbeitet. MitM-Angreifer können ein ausgewähltes Byte eines Chiffretextes in nur 256 Versuchen entschlüsseln, wenn sie die betroffene Applikation zwingen können, wiederholt dieselben Daten über neu erstellte SSL 3.0-Verbindungen zu senden. Solange sowohl ein Client als auch ein Dienst SSLv3 unterstützen, kann eine Verbindung auf SSLv3 "zurückgesetzt" werden, auch wenn TLSv1 oder neuer vom Client und Dienst unterstützt wird. Der TLS Fallback SCSV-Mechanismus verhindert "Versions-Rollback"-Angriffe, ohne Legacy-Clients zu beeinträchtigen. Verbindungen können jedoch nur geschützt werden, wenn Client und Dienst den Mechanismus unterstützen. Websites, die SSLv3 nicht sofort deaktivieren können, sollten diesen Mechanismus aktivieren. Dies ist eine Schwachstelle in der SSLv3-Spezifikation, nicht in einer bestimmten SSL-Implementierung. Das Deaktivieren von SSLv3 ist die einzige Möglichkeit, die Schwachstelle vollständig zu verringern.
The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.

As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1 or newer is supported by the client and service.

The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients; however, it can only protect connections when the client and service support the mechanism. Sites that cannot disable SSLv3 immediately should enable this mechanism.

This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is the only way to completely mitigate the vulnerability.

Disable SSLv3. Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.

Finding IDAffected System
437172.21.221.211

CVE:

CVE-2014-3566

CWE:

N/A

VPR:

5.7

MEDIUM

CVSS3:

N/A

CVSS:

4.3

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.
Die vom Webdienst verwendeten Verschlüsselungsalgorithmen weisen Konfigurationsschwächen auf. Die Konfiguration sollte geändert und arcfour Algorithmen gelöscht werden.
Nessus has detected that the remote SSH server is configured to use the Arcfour stream cipher or no cipher at all. RFC 4253 advises against using Arcfour due to an issue with weak keys.

Contact the vendor or consult product documentation to remove the weak ciphers.

Finding IDAffected System
456172.21.0.4
457172.21.0.9
458172.21.0.10
459172.21.0.15
460172.21.0.16
461172.21.17.11
462172.21.17.12
463172.21.17.13
464172.21.17.14
466172.21.147.1
467172.21.172.22
468172.21.172.37
469172.21.173.11
172.21.221.4
471172.21.221.9
172.21.221.24
473172.21.221.27
172.21.221.31
475172.21.221.32
172.21.221.36
477172.21.221.37
478172.21.221.40
479172.21.221.41
480172.21.221.42
481172.21.221.46
172.21.221.47
172.21.221.48
172.21.221.50
485172.21.221.200
486172.21.221.201
487172.21.221.211
488172.21.221.233
489172.21.221.240
490172.21.221.241
491172.21.221.243

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

5.3

CVSS:

4.3

The remote web server is affected by an information disclosure vulnerability.
The remote web server is affected by an information disclosure vulnerability due to the ETag header providing sensitive information that could aid an attacker, such as the inode number of requested files.

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

Finding IDAffected System
439172.21.0.16
172.21.17.11
172.21.17.12
172.21.17.14
442172.21.221.9
172.21.221.24
444172.21.221.32
172.21.221.36
446172.21.221.37
447172.21.221.40
448172.21.221.41
449172.21.221.42
172.21.221.47
451172.21.221.211
452172.21.221.233
453172.21.221.240
454172.21.221.241
455172.21.221.243

CVE:

CVE-2003-1418

CWE:

200

VPR:

1.4

MEDIUM

CVSS3:

5.9

CVSS:

4.3

The remote service supports the use of the RC4 cipher.
Die vom Webdienst verwendeten Verschlüsselungsalgorithmen weisen Konfigurationsschwächen auf. Die Konfiguration sollte geändert und RC4 gelöscht werden.
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.

If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

Finding IDAffected System
172.21.220.11
362172.21.221.76
363172.21.221.211

CVE:

CVE-2013-2566

CVE-2015-2808

CWE:

N/A

VPR:

3.6

MEDIUM

CVSS3:

6.1

CVSS:

4.3

The remote web server is affected by multiple cross site scripting vulnerability.
Gemäß der selbstberichteten Version im Skript ist die auf dem Remotewebserver gehostete Version von JQuery größer oder gleich 1.2 und vor 3.5.0. Es ist daher von mehreren Cross-Site-Scripting-Schwachstellen betroffen. Beachten Sie, dass die Schwachstellen, auf die in diesem Plugin verwiesen wird, keine Sicherheitsauswirkungen auf PAN-OS haben und/oder die szenarien, die für eine erfolgreiche Ausnutzung erforderlich sind, auf Geräten, auf denen eine PAN-OS-Version ausgeführt wird, nicht vorhanden sind.
According to the self-reported version in the script, the version of JQuery hosted on the remote web server is greater than or equal to 1.2 and prior to 3.5.0. It is, therefore, affected by multiple cross site scripting vulnerabilities.

Note, the vulnerabilities referenced in this plugin have no security impact on PAN-OS, and/or the scenarios required for successful exploitation do not exist on devices running a PAN-OS release.

Upgrade to JQuery version 3.5.0 or later.

Finding IDAffected System
641172.21.11.121
172.21.17.13

CVE:

CVE-2020-11022

CVE-2020-11023

CWE:

N/A

VPR:

5.7

MEDIUM

CVSS3:

5.9

CVSS:

4.3

The remote web server is affected by a denial of service vulnerability.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.35. It is, therefore, affected by the following vulnerability:

  - By sending continuous SETTINGS frames of maximum size an ongoing   HTTP/2 connection could be kept busy and would never time out. This   can be abused for a DoS on the server. This only affect a server   that has enabled the h2 protocol.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.35 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2018-11763

CWE:

N/A

VPR:

3.6

MEDIUM

CVSS3:

6.5

CVSS:

4.0

The remote name server is affected by a denial of service vulnerability.
According to its self-reported version number, the installation of ISC BIND running on the remote name server is version 9.x prior to 9.11.22, 9.12.x prior to 9.16.6 or 9.17.x prior to 9.17.4. It is, therefore, affected by a denial of service (DoS) vulnerability due to an assertion failure when attempting to verify a truncated response to a TSIG-signed request. An authenticated, remote attacker can exploit this issue by sending a truncated response to a TSIG-signed request to trigger an assertion failure, causing the server to exit.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version   number.

Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.

Finding IDAffected System
648172.21.0.16

CVE:

CVE-2020-8622

CWE:

N/A

VPR:

4.4

LOW

CVSS3:

N/A

CVSS:

N/A

The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.
Mindestens eines der vom Remotehost gesendeten X.509-Zertifikate hat einen Schlüssel, der kürzer als 2048 Bit ist. Gemäß den vom Certification Authority/Browser (CA/B) Forum festgelegten Industriestandards müssen Zertifikate, die nach dem 1. Januar 2014 ausgestellt wurden, mindestens 2048 Bit groß sein. Einige Browser-SSL-Implementierungen können Schlüssel mit weniger als 2048 Bit nach dem 1. Januar 2014 ablehnen. Darüber hinaus können einige SSL-Zertifikatanbieter Zertifikate mit weniger als 2048 Bit vor dem 1. Januar 2014 widerrufen.
At least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/Browser (CA/B) Forum, certificates issued after January 1, 2014 must be at least 2048 bits.

Some browser SSL implementations may reject keys less than 2048 bits after January 1, 2014. Additionally, some SSL certificate vendors may revoke certificates less than 2048 bits before January 1, 2014.

Note that Nessus will not flag root certificates with RSA keys less than 2048 bits if they were issued prior to December 31, 2010, as the standard considers them exempt.

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

Finding IDAffected System
364172.21.172.24
172.21.220.11
366172.21.221.76

CVE:

N/A

CWE:

N/A

VPR:

N/A

LOW

CVSS3:

5.9

CVSS:

2.6

The remote service supports the use of anonymous SSL ciphers.
Der Remote-Host unterstützt die Verwendung anonymer SSL-Verschlüsselung. Auf diese Weise kann ein Administrator einen Dienst einrichten, der den Datenverkehr verschlüsselt, ohne dass SSL-Zertifikate generiert und konfiguriert werden müssen. Er bietet jedoch keine Möglichkeit, die Identität des Remotehosts zu überprüfen und macht den Dienst anfällig für Man-in-the-Middle-Angriffe.
The remote host supports the use of anonymous SSL ciphers. While this enables an administrator to set up a service that encrypts traffic without having to generate and configure SSL certificates, it offers no way to verify the remote host's identity and renders the service vulnerable to a man-in-the-middle attack.

Note: This is considerably easier to exploit if the attacker is on the same physical network.

Reconfigure the affected application if possible to avoid use of weak ciphers.

Finding IDAffected System
150172.21.11.22
151172.21.172.37
152172.21.174.31
154172.21.174.33
172.21.220.11
156172.21.221.76

CVE:

CVE-2007-1858

CWE:

N/A

VPR:

4.4

LOW

CVSS3:

N/A

CVSS:

2.6

The remote POP3 daemon allows credentials to be transmitted in cleartext.
The remote host is running a POP3 daemon that allows cleartext logins over unencrypted connections. An attacker can uncover user names and passwords by sniffing traffic to the POP3 daemon if a less secure authentication mechanism (eg, USER command, AUTH PLAIN, AUTH LOGIN) is used.

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

Finding IDAffected System
138172.21.11.11
139172.21.11.12
140172.21.11.14
141172.21.11.15
142172.21.11.17
143172.21.11.20
172.21.198.5

CVE:

N/A

CWE:

N/A

VPR:

N/A

LOW

CVSS3:

3.7

CVSS:

2.6

The remote SSH server is configured to allow weak key exchange algorithms.
The remote SSH server is configured to allow key exchange algorithms which are considered weak.

This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) draft-ietf-curdle-ssh-kex-sha2-20. Section 4 lists guidance on key exchange algorithms that SHOULD NOT and MUST NOT be enabled. This includes:

  diffie-hellman-group-exchange-sha1

  diffie-hellman-group1-sha1

  gss-gex-sha1-*

  gss-group1-sha1-*

  gss-group14-sha1-*

  rsa1024-sha1

Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions.

Contact the vendor or consult product documentation to disable the weak algorithms.

Finding IDAffected System
694172.21.0.4
695172.21.0.9
696172.21.0.10
697172.21.0.15
698172.21.0.16
699172.21.17.11
700172.21.17.12
701172.21.17.13
702172.21.17.14
704172.21.147.1
705172.21.172.22
706172.21.172.37
172.21.198.171
172.21.198.181
709172.21.198.182
172.21.221.4
711172.21.221.9
172.21.221.24
713172.21.221.27
172.21.221.31
715172.21.221.32
172.21.221.36
717172.21.221.37
718172.21.221.40
719172.21.221.41
720172.21.221.42
721172.21.221.46
172.21.221.47
172.21.221.48
172.21.221.50
725172.21.221.200
726172.21.221.201
727172.21.221.211
728172.21.221.233
729172.21.221.240
730172.21.221.241
731172.21.221.243

CVE:

N/A

CWE:

N/A

VPR:

N/A

LOW

CVSS3:

N/A

CVSS:

2.6

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered weak.

Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions.

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

Finding IDAffected System
401172.21.0.4
402172.21.0.9
403172.21.0.10
404172.21.0.15
405172.21.0.16
406172.21.17.11
407172.21.17.12
408172.21.17.13
409172.21.17.14
411172.21.147.1
412172.21.172.22
413172.21.172.37
172.21.221.4
415172.21.221.9
172.21.221.24
417172.21.221.27
172.21.221.31
419172.21.221.32
172.21.221.36
421172.21.221.37
422172.21.221.40
423172.21.221.41
424172.21.221.42
425172.21.221.46
172.21.221.47
172.21.221.48
172.21.221.50
429172.21.221.200
430172.21.221.201
431172.21.221.211
432172.21.221.233
433172.21.221.240
434172.21.221.241
435172.21.221.243

CVE:

N/A

CWE:

N/A

VPR:

N/A

LOW

CVSS3:

N/A

CVSS:

2.6

The SSH server is configured to use Cipher Block Chaining.
The SSH server is configured to support Cipher Block Chaining (CBC) encryption.  This may allow an attacker to recover the plaintext message from the ciphertext. 

Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions.

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

Finding IDAffected System
367172.21.0.4
368172.21.0.9
369172.21.0.10
370172.21.0.15
371172.21.0.16
372172.21.17.11
373172.21.17.12
374172.21.17.13
375172.21.17.14
377172.21.147.1
378172.21.172.37
172.21.221.4
380172.21.221.9
172.21.221.24
382172.21.221.27
172.21.221.31
384172.21.221.32
172.21.221.36
386172.21.221.37
387172.21.221.40
388172.21.221.41
389172.21.221.42
390172.21.221.46
172.21.221.47
172.21.221.48
172.21.221.50
394172.21.221.200
395172.21.221.201
396172.21.221.211
397172.21.221.233
398172.21.221.240
399172.21.221.241
400172.21.221.243

CVE:

CVE-2008-5161

CWE:

200

VPR:

2.5

LOW

CVSS3:

N/A

CVSS:

2.6

The remote service has a configuration that may make it vulnerable to the CRIME attack.
Der Remotedienst verfügt über eine von zwei Konfigurationen, von denen bekannt ist, dass sie für den CRIME-Angriff erforderlich sind: 1. SSL / TLS-Komprimierung ist aktiviert 0der 2. TLS kündigt das SPDY-Protokoll vor Version 4 an.
The remote service has one of two configurations that are known to be required for the CRIME attack :

  - SSL / TLS compression is enabled.

  - TLS advertises the SPDY protocol earlier than version 4.

Note that Nessus did not attempt to launch the CRIME attack against the remote service.

Disable compression and / or the SPDY service.

Finding IDAffected System
360172.21.221.211

CVE:

CVE-2012-4929

CVE-2012-4930

CWE:

N/A

VPR:

5.9

INFO

CVSS3:

0.0

CVSS:

0.0

An ONC RPC portmapper is running on the remote host.
The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request.

n/a

Finding IDAffected System
104172.21.0.2
105172.21.0.4
106172.21.0.10
107172.21.0.15
108172.21.0.16
109172.21.0.23
110172.21.0.24
111172.21.0.25
112172.21.0.250
113172.21.174.31
115172.21.174.33
116172.21.174.220
117172.21.198.240
172.21.198.250
172.21.198.251
172.21.199.201

CVE:

CVE-1999-0632

CWE:

N/A

VPR:

N/A

INFO

CVSS3:

0.0

CVSS:

0.0

It is possible to determine the exact time set on the remote host.
The remote host answers to an ICMP timestamp request.  This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.

Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

Finding IDAffected System
1172.21.0.2
2172.21.0.4
3172.21.0.9
4172.21.0.10
5172.21.0.15
6172.21.0.16
7172.21.0.23
8172.21.0.24
9172.21.0.25
10172.21.0.101
11172.21.0.250
172.21.1.1
13172.21.1.11
14172.21.1.13
15172.21.1.101
16172.21.11.4
17172.21.11.5
19172.21.11.22
20172.21.11.121
21172.21.11.122
22172.21.11.145
23172.21.11.230
24172.21.11.250
25172.21.17.11
26172.21.17.12
27172.21.17.13
28172.21.17.14
30172.21.21.11
31172.21.70.11
32172.21.147.1
33172.21.172.21
35172.21.172.37
36172.21.172.42
37172.21.172.44
38172.21.172.45
39172.21.172.46
40172.21.172.47
41172.21.172.100
42172.21.172.101
43172.21.172.105
44172.21.172.106
45172.21.172.146
46172.21.172.147
47172.21.172.200
48172.21.172.240
49172.21.173.11
50172.21.173.111
51172.21.173.112
52172.21.173.121
53172.21.173.200
54172.21.174.11
55172.21.174.31
56172.21.174.32
57172.21.174.33
58172.21.174.220
59172.21.174.230
60172.21.198.11
61172.21.198.20
62172.21.198.21
172.21.198.22
64172.21.198.23
65172.21.198.24
66172.21.198.30
172.21.198.32
172.21.198.110
172.21.198.111
70172.21.198.112
172.21.198.113
72172.21.198.114
172.21.198.171
172.21.198.181
75172.21.198.182
172.21.198.230
77172.21.198.240
172.21.198.250
172.21.198.251
172.21.199.201
81172.21.199.211
172.21.220.11
83172.21.220.12
172.21.221.4
172.21.221.11
172.21.221.24
172.21.221.26
172.21.221.31
172.21.221.36
91172.21.221.40
92172.21.221.41
172.21.221.50
172.21.221.56
95172.21.221.76
96172.21.221.200
97172.21.221.201
98172.21.221.211
99172.21.221.233
100172.21.221.238
101172.21.221.240
102172.21.221.241
103172.21.221.243

CVE:

CVE-1999-0524

CWE:

200

VPR:

N/A

Full detection information for each system can be found in this section. Changes observed since the previous scan are highlighted.

All scanned systems
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Down Critical High Medium Low Info Nonex No WAF
Please click on a system in the grid to view its details here

172.21.17.13 (VulnLIB) CRITICAL CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:57:04 2022-03-26 22:25:40
WAFs detected:
  • 172.21.17.13
  • No reverse DNS entries
  • 172.21.17.13
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Vulnerabilities detected:
CRITICALID: 356

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u7
  Installed version   : 5.4.45-0+deb7u7
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596530')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1647596528')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596530')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1647596528')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID: 463

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : http://172.21.17.13:9292/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0
URL               : http://172.21.17.13/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


MEDIUMID:

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : http://172.21.17.13:9292/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0
URL               : http://172.21.17.13/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 374

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 408

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 701

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 27

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 356

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u7
  Installed version   : 5.4.45-0+deb7u7
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID: 463

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : http://172.21.17.13/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 374

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 408

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 701

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 27

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.211 (Telephony) CRITICAL CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:46:32 2022-03-26 23:17:54
WAFs detected:
  • 172.21.221.211
  • No reverse DNS entries
  • 172.21.221.211
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 on Debian 5.0 (lenny) Linux Kernel 2.6 on Debian 5.0 (lenny)
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 195

The operating system running on the remote host is no longer supported.

Debian 5.0 support ended on 2012-02-06.
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


HIGHID: 149

The remote service encrypts traffic using a protocol with known weaknesses.

- SSLv3 is enabled and the server supports at least one cipher.
	Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3


  Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    EDH-RSA-DES-CBC3-SHA                           DH            RSA      3DES-CBC(168)          SHA1
    DES-CBC3-SHA                                   RSA           RSA      3DES-CBC(168)          SHA1

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DHE-RSA-AES128-SHA                             DH            RSA      AES-CBC(128)           SHA1
    DHE-RSA-AES256-SHA                             DH            RSA      AES-CBC(256)           SHA1
    AES128-SHA                                     RSA           RSA      AES-CBC(128)           SHA1
    AES256-SHA                                     RSA           RSA      AES-CBC(256)           SHA1
    RC4-MD5                                        RSA           RSA      RC4(128)               MD5
    RC4-SHA                                        RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Consult the application's documentation to disable SSL 2.0 and 3.0. Use TLS 1.2 (with approved cipher suites) or higher instead.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 349

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=hellphone.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 437

It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.

Nessus determined that the remote server supports SSLv3 with at least one CBC 
cipher suite, indicating that this server is vulnerable.

It appears that TLSv1 or newer is supported on the server. However, the 
Fallback SCSV mechanism is not supported, allowing connections to be "rolled 
back" to SSLv3.

Disable SSLv3. Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.

CVE:CVE-2014-3566
CWE:N/A
VPR:5.6


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1272578831.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 10:31:07 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1272578831.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1749210743.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 10:31:07 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1749210743.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID: 148

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=hellphone.de
  Issuer           : CN=hellphone.de
  Not valid before : Jul 22 21:59:53 2009 GMT
  Not valid after  : Jul 20 21:59:53 2019 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 206

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : CN=hellphone.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : Jul 22 21:59:53 2009 GMT
Valid To            : Jul 20 21:59:53 2019 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
MIIBpTCCAQ4CCQD/cVrwLpJICzANBgkqhkiG9w0BAQUFADAXMRUwEwYDVQQDEwxoZWxscGhvbmUuZGUwHhcNMDkwNzIyMjE1OTUzWhcNMTkwNzIwMjE1OTUzWjAXMRUwEwYDVQQDEwxoZWxscGhvbmUuZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALMDVlNPzgoOTtr/IQhI75PQ17cSx1yJ9BZ08aJ6J/3gOWWWqeX/ho+N5hjZWob2yBPe8TkyFqSkc+OEtUSB9dG2CoqygTtPTgEPMevsduc8DiyJAJFzS3FyOWAYTuARmR8mu3bhwe8iGPKrO/AWWi37kHKwO0meHwp3dUz+WSSvAgMBAAEwDQYJKoZIhvcNAQEFBQADgYEAegqhwT4Ti8fmjDrTtMx/VUfFKqYQ1qGK5mxDEKIQ5lL/MLGl0S602E7IVjrcfp5wPSh6ZrNL9mb4d4RLnBYEh0qLOFKv5AFo+vlaERNFS/sjRu0y2A2sO66Z8Drvh+mk6KitDQK3jYTDWwJfWSkgE4eyiy1D9v4pxUynMejZ+0Q=
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID: 212

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    EDH-RSA-DES-CBC3-SHA          0x00, 0x16       DH            RSA      3DES-CBC(168)          SHA1
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID: 292

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject   : CN=hellphone.de
|-Not After : Jul 20 21:59:53 2019 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=hellphone.de
|-Issuer  : CN=hellphone.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1272578831.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 10:31:07 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1272578831.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1749210743.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 10:31:07 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1749210743.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID: 567

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 363

The remote service supports the use of the RC4 cipher.

List of RC4 cipher suites supported by the remote server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    RC4-MD5                       0x00, 0x04       RSA           RSA      RC4(128)               MD5
    RC4-SHA                       0x00, 0x05       RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

CVE:CVE-2013-2566, CVE-2015-2808
CWE:N/A
VPR:3.6


MEDIUMID: 487

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 451

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "191d-0-50e6b7e7d8c80"
  Inode number           : 6429
  File size              : 0 bytes
  File modification time : Feb.  6, 2015 at 13:35:30 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


LOWID: 727

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 431

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 396

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 360

The remote service has a configuration that may make it vulnerable to the CRIME attack.

The following configuration indicates that the remote service
may be vulnerable to the CRIME attack :

  - SSL / TLS compression is enabled.

Disable compression and / or the SPDY service.

CVE:CVE-2012-4929, CVE-2012-4930
CWE:N/A
VPR:5.9


INFOID: 98

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 195

The operating system running on the remote host is no longer supported.

Debian 5.0 support ended on 2012-02-06.
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


HIGHID: 149

The remote service encrypts traffic using a protocol with known weaknesses.

- SSLv3 is enabled and the server supports at least one cipher.
	Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3


  Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    EDH-RSA-DES-CBC3-SHA                           DH            RSA      3DES-CBC(168)          SHA1
    DES-CBC3-SHA                                   RSA           RSA      3DES-CBC(168)          SHA1

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DHE-RSA-AES128-SHA                             DH            RSA      AES-CBC(128)           SHA1
    DHE-RSA-AES256-SHA                             DH            RSA      AES-CBC(256)           SHA1
    AES128-SHA                                     RSA           RSA      AES-CBC(128)           SHA1
    AES256-SHA                                     RSA           RSA      AES-CBC(256)           SHA1
    RC4-MD5                                        RSA           RSA      RC4(128)               MD5
    RC4-SHA                                        RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Consult the application's documentation to disable SSL 2.0 and 3.0. Use TLS 1.2 (with approved cipher suites) or higher instead.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 349

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=hellphone.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 437

It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.

Nessus determined that the remote server supports SSLv3 with at least one CBC 
cipher suite, indicating that this server is vulnerable.

It appears that TLSv1 or newer is supported on the server. However, the 
Fallback SCSV mechanism is not supported, allowing connections to be "rolled 
back" to SSLv3.

Disable SSLv3. Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.

CVE:CVE-2014-3566
CWE:N/A
VPR:5.7


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1266746963.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 22:02:29 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1266746963.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus753427652.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 22:02:29 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus753427652.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID: 148

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=hellphone.de
  Issuer           : CN=hellphone.de
  Not valid before : Jul 22 21:59:53 2009 GMT
  Not valid after  : Jul 20 21:59:53 2019 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 206

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : CN=hellphone.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : Jul 22 21:59:53 2009 GMT
Valid To            : Jul 20 21:59:53 2019 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID: 212

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    EDH-RSA-DES-CBC3-SHA          0x00, 0x16       DH            RSA      3DES-CBC(168)          SHA1
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID: 292

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject   : CN=hellphone.de
|-Not After : Jul 20 21:59:53 2019 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=hellphone.de
|-Issuer  : CN=hellphone.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1266746963.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 22:02:29 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1266746963.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus753427652.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 22:02:29 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus753427652.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID: 567

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 363

The remote service supports the use of the RC4 cipher.

List of RC4 cipher suites supported by the remote server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    RC4-MD5                       0x00, 0x04       RSA           RSA      RC4(128)               MD5
    RC4-SHA                       0x00, 0x05       RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

CVE:CVE-2013-2566, CVE-2015-2808
CWE:N/A
VPR:3.6


MEDIUMID: 487

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 451

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "191d-0-50e6b7e7d8c80"
  Inode number           : 6429
  File size              : 0 bytes
  File modification time : Feb.  6, 2015 at 13:35:30 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


LOWID: 727

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 431

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 396

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 360

The remote service has a configuration that may make it vulnerable to the CRIME attack.

The following configuration indicates that the remote service
may be vulnerable to the CRIME attack :

  - SSL / TLS compression is enabled.

Disable compression and / or the SPDY service.

CVE:CVE-2012-4929, CVE-2012-4930
CWE:N/A
VPR:5.9


INFOID: 98

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.12 (ISP) HIGH CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:51:36 2022-03-26 22:20:22
WAFs detected:
  • 172.21.11.12
  • No reverse DNS entries
  • 172.21.11.12
  • No reverse DNS entries
OS detected: Ubuntu 14.04 Linux Kernel 3.13 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp25smtp
tcp80www
tcp110pop3
tcp443www
Protocol Port Service
tcp25smtp
tcp80www
tcp110pop3
tcp443www
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.53
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.53

Upgrade to Apache version 2.4.53 or later.

CVE:CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943
CWE:N/A
VPR:6.3


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.39
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.39

Upgrade to Apache version 2.4.39 or later.

CVE:CVE-2019-0196, CVE-2019-0197, CVE-2019-0211, CVE-2019-0215, CVE-2019-0217, CVE-2019-0220
CWE:N/A
VPR:7.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.53
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.53

Upgrade to Apache version 2.4.53 or later.

CVE:CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943
CWE:N/A
VPR:6.3


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.52
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.52

Upgrade to Apache version 2.4.52 or later.

CVE:CVE-2021-44224, CVE-2021-44790
CWE:N/A
VPR:9.0


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.52
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.52

Upgrade to Apache version 2.4.52 or later.

CVE:CVE-2021-44224, CVE-2021-44790
CWE:N/A
VPR:9.0


HIGHID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-34798, CVE-2021-39275
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-34798, CVE-2021-39275
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.47
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.47

Upgrade to Apache version 2.4.47 or later.

CVE:CVE-2019-17567, CVE-2020-13938, CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-26691, CVE-2021-30641
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.47
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.47

Upgrade to Apache version 2.4.47 or later.

CVE:CVE-2019-17567, CVE-2020-13938, CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-26691, CVE-2021-30641
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.46
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.46

Upgrade to Apache version 2.4.46 or later.

CVE:CVE-2020-9490, CVE-2020-11984, CVE-2020-11993
CWE:N/A
VPR:8.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.46
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.46

Upgrade to Apache version 2.4.46 or later.

CVE:CVE-2020-9490, CVE-2020-11984, CVE-2020-11993
CWE:N/A
VPR:8.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.39
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.39

Upgrade to Apache version 2.4.39 or later.

CVE:CVE-2019-0196, CVE-2019-0197, CVE-2019-0211, CVE-2019-0215, CVE-2019-0217, CVE-2019-0220
CWE:N/A
VPR:7.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.26
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.26

Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.

CVE:CVE-2017-3167, CVE-2017-3169, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.26
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.26

Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.

CVE:CVE-2017-3167, CVE-2017-3169, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679
CWE:N/A
VPR:6.7


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.34
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.34

Upgrade to Apache version 2.4.34 or later.

CVE:CVE-2018-1333, CVE-2018-8011
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.28
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.28

Upgrade to Apache version 2.4.28 or later.

CVE:CVE-2017-9798
CWE:N/A
VPR:6.1


MEDIUMID: 229

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-33193
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-33193
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.27
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.27

Upgrade to Apache version 2.4.27 or later.

CVE:CVE-2017-9788, CVE-2017-9789
CWE:N/A
VPR:6.0


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-40438
CWE:N/A
VPR:10.0


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-40438
CWE:N/A
VPR:10.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.27
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.27

Upgrade to Apache version 2.4.27 or later.

CVE:CVE-2017-9788, CVE-2017-9789
CWE:N/A
VPR:6.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.28
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.28

Upgrade to Apache version 2.4.28 or later.

CVE:CVE-2017-9798
CWE:N/A
VPR:6.1


MEDIUMID: 510

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by a denial of service vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.35
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.35

Upgrade to Apache version 2.4.35 or later.

CVE:CVE-2018-11763
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.42
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.42

Upgrade to Apache version 2.4.42 or later.

CVE:CVE-2020-1927, CVE-2020-1934
CWE:N/A
VPR:3.8


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.42
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.42

Upgrade to Apache version 2.4.42 or later.

CVE:CVE-2020-1927, CVE-2020-1934
CWE:N/A
VPR:3.8


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.41
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.41

Upgrade to Apache version 2.4.41 or later.

CVE:CVE-2019-9517, CVE-2019-10081, CVE-2019-10082, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.41
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.41

Upgrade to Apache version 2.4.41 or later.

CVE:CVE-2019-9517, CVE-2019-10081, CVE-2019-10082, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.34
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.34

Upgrade to Apache version 2.4.34 or later.

CVE:CVE-2018-1333, CVE-2018-8011
CWE:N/A
VPR:3.6


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus2146448736.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 09:36:22 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus2146448736.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus109676596.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 09:36:22 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus109676596.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.33
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.33

Upgrade to Apache version 2.4.33 or later.

CVE:CVE-2017-15710, CVE-2017-15715, CVE-2018-1283, CVE-2018-1301, CVE-2018-1302, CVE-2018-1303, CVE-2018-1312
CWE:N/A
VPR:7.4


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.33
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.33

Upgrade to Apache version 2.4.33 or later.

CVE:CVE-2017-15710, CVE-2017-15715, CVE-2018-1283, CVE-2018-1301, CVE-2018-1302, CVE-2018-1303, CVE-2018-1312
CWE:N/A
VPR:7.4


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.38
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.38

Upgrade to Apache version 2.4.38 or later.

CVE:CVE-2018-17189, CVE-2018-17199, CVE-2019-0190
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.38
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.38

Upgrade to Apache version 2.4.38 or later.

CVE:CVE-2018-17189, CVE-2018-17199, CVE-2019-0190
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by a denial of service vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.35
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.35

Upgrade to Apache version 2.4.35 or later.

CVE:CVE-2018-11763
CWE:N/A
VPR:3.6


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus2146448736.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 09:36:22 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus2146448736.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus109676596.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 09:36:22 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus109676596.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


LOWID: 139

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.53
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.53

Upgrade to Apache version 2.4.53 or later.

CVE:CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943
CWE:N/A
VPR:5.9


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.39
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.39

Upgrade to Apache version 2.4.39 or later.

CVE:CVE-2019-0196, CVE-2019-0197, CVE-2019-0211, CVE-2019-0215, CVE-2019-0217, CVE-2019-0220
CWE:N/A
VPR:7.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.53
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.53

Upgrade to Apache version 2.4.53 or later.

CVE:CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943
CWE:N/A
VPR:5.9


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.52
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.52

Upgrade to Apache version 2.4.52 or later.

CVE:CVE-2021-44224, CVE-2021-44790
CWE:N/A
VPR:9.0


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.52
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.52

Upgrade to Apache version 2.4.52 or later.

CVE:CVE-2021-44224, CVE-2021-44790
CWE:N/A
VPR:9.0


HIGHID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-34798, CVE-2021-39275
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-34798, CVE-2021-39275
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.47
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.47

Upgrade to Apache version 2.4.47 or later.

CVE:CVE-2019-17567, CVE-2020-13938, CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-26691, CVE-2021-30641
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.47
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.47

Upgrade to Apache version 2.4.47 or later.

CVE:CVE-2019-17567, CVE-2020-13938, CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-26691, CVE-2021-30641
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.46
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.46

Upgrade to Apache version 2.4.46 or later.

CVE:CVE-2020-9490, CVE-2020-11984, CVE-2020-11993
CWE:N/A
VPR:8.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.46
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.46

Upgrade to Apache version 2.4.46 or later.

CVE:CVE-2020-9490, CVE-2020-11984, CVE-2020-11993
CWE:N/A
VPR:8.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.39
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.39

Upgrade to Apache version 2.4.39 or later.

CVE:CVE-2019-0196, CVE-2019-0197, CVE-2019-0211, CVE-2019-0215, CVE-2019-0217, CVE-2019-0220
CWE:N/A
VPR:7.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.26
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.26

Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.

CVE:CVE-2017-3167, CVE-2017-3169, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.26
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.26

Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.

CVE:CVE-2017-3167, CVE-2017-3169, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679
CWE:N/A
VPR:6.7


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.34
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.34

Upgrade to Apache version 2.4.34 or later.

CVE:CVE-2018-1333, CVE-2018-8011
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.28
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.28

Upgrade to Apache version 2.4.28 or later.

CVE:CVE-2017-9798
CWE:N/A
VPR:6.1


MEDIUMID: 229

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-33193
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-33193
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.27
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.27

Upgrade to Apache version 2.4.27 or later.

CVE:CVE-2017-9788, CVE-2017-9789
CWE:N/A
VPR:6.0


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-40438
CWE:N/A
VPR:10.0


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-40438
CWE:N/A
VPR:10.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.27
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.27

Upgrade to Apache version 2.4.27 or later.

CVE:CVE-2017-9788, CVE-2017-9789
CWE:N/A
VPR:6.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.28
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.28

Upgrade to Apache version 2.4.28 or later.

CVE:CVE-2017-9798
CWE:N/A
VPR:6.1


MEDIUMID: 510

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by a denial of service vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.35
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.35

Upgrade to Apache version 2.4.35 or later.

CVE:CVE-2018-11763
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.42
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.42

Upgrade to Apache version 2.4.42 or later.

CVE:CVE-2020-1927, CVE-2020-1934
CWE:N/A
VPR:3.8


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.42
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.42

Upgrade to Apache version 2.4.42 or later.

CVE:CVE-2020-1927, CVE-2020-1934
CWE:N/A
VPR:3.8


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.41
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.41

Upgrade to Apache version 2.4.41 or later.

CVE:CVE-2019-9517, CVE-2019-10081, CVE-2019-10082, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.41
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.41

Upgrade to Apache version 2.4.41 or later.

CVE:CVE-2019-9517, CVE-2019-10081, CVE-2019-10082, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.34
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.34

Upgrade to Apache version 2.4.34 or later.

CVE:CVE-2018-1333, CVE-2018-8011
CWE:N/A
VPR:3.6


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1354742777.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 21:05:08 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1354742777.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus2063119116.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 21:05:08 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus2063119116.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.33
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.33

Upgrade to Apache version 2.4.33 or later.

CVE:CVE-2017-15710, CVE-2017-15715, CVE-2018-1283, CVE-2018-1301, CVE-2018-1302, CVE-2018-1303, CVE-2018-1312
CWE:N/A
VPR:7.4


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.33
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.33

Upgrade to Apache version 2.4.33 or later.

CVE:CVE-2017-15710, CVE-2017-15715, CVE-2018-1283, CVE-2018-1301, CVE-2018-1302, CVE-2018-1303, CVE-2018-1312
CWE:N/A
VPR:7.4


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.38
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.38

Upgrade to Apache version 2.4.38 or later.

CVE:CVE-2018-17189, CVE-2018-17199, CVE-2019-0190
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.38
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.38

Upgrade to Apache version 2.4.38 or later.

CVE:CVE-2018-17189, CVE-2018-17199, CVE-2019-0190
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by a denial of service vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.35
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.35

Upgrade to Apache version 2.4.35 or later.

CVE:CVE-2018-11763
CWE:N/A
VPR:3.6


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1354742777.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 21:05:08 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1354742777.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus2063119116.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 21:05:08 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus2063119116.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


LOWID: 139

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.21.11 (ciproc intern) HIGH CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:45:18 2022-03-26 22:13:35
WAFs detected:
  • 172.21.46.77
  • www.ciproc.de
  • 172.21.46.77
  • www.ciproc.de
OS detected: Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows 7 Microsoft Windows Server 2008 R2
Ports detected:
Protocol Port Service
tcp139smb
tcp445cifs
tcp999ssh
Protocol Port Service
tcp139smb
tcp445cifs
tcp999ssh
Vulnerabilities detected:
HIGHID: 810

The remote Samba server is potentially affected by multiple vulnerabilities.

Installed version : 4.9.5-Debian
  Fixed version     : 4.13.17

Upgrade to Samba version 4.13.17, 4.14.12, or 4.15.5 or later.

CVE:CVE-2021-44141, CVE-2021-44142, CVE-2022-0336
CWE:N/A
VPR:9.0


MEDIUMID: 352

Signing is not required on the remote SMB server.


  

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 30

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
HIGHID: 810

The remote Samba server is potentially affected by multiple vulnerabilities.

Installed version : 4.9.5-Debian
  Fixed version     : 4.13.17

Upgrade to Samba version 4.13.17, 4.14.12, or 4.15.5 or later.

CVE:CVE-2021-44141, CVE-2021-44142, CVE-2022-0336
CWE:N/A
VPR:8.4


MEDIUMID: 352

Signing is not required on the remote SMB server.


  

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 30

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.250 (ISP) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:53:54 2022-03-26 22:20:33
WAFs detected:
  • 172.21.11.250
  • No reverse DNS entries
  • 172.21.11.250
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp21ftp
tcp443www
tcp999ssh
tcp8080www
tcp8081www
Protocol Port Service
tcp21ftp
tcp443www
tcp999ssh
tcp8080http-alt?
tcp8081www
Vulnerabilities detected:
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

http://172.21.11.250:8081/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------
Nessus was able to exploit the issue using the following request :

http://172.21.11.250:443/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

http://172.21.11.250:8081/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------
Nessus was able to exploit the issue using the following request :

http://172.21.11.250:443/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 203

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : May 02 01:14:29 2012 GMT
Valid To            : Apr 27 01:14:29 2032 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
MIIEjzCCA3egAwIBAgIJAOojX+kzagfTMA0GCSqGSIb3DQEBBQUAMIGLMQswCQYDVQQGEwJERTEQMA4GA1UECBMHQmFkLVd1ZTETMBEGA1UEBxMKSGVpZGVsYmVyZzEQMA4GA1UEChMHYWRkMndlYjERMA8GA1UECxMIV2ViYWRtaW4xCzAJBgNVBAMTAkFFMSMwIQYJKoZIhvcNAQkBFhR3ZWJtYXN0ZXJAYWRkMndlYi5kZTAeFw0xMjA1MDIwMTE0MjlaFw0zMjA0MjcwMTE0MjlaMIGLMQswCQYDVQQGEwJERTEQMA4GA1UECBMHQmFkLVd1ZTETMBEGA1UEBxMKSGVpZGVsYmVyZzEQMA4GA1UEChMHYWRkMndlYjERMA8GA1UECxMIV2ViYWRtaW4xCzAJBgNVBAMTAkFFMSMwIQYJKoZIhvcNAQkBFhR3ZWJtYXN0ZXJAYWRkMndlYi5kZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMas0iNl3NE6L/y0Lr3yijaTfKcH0TBwi2ok2iZ+NAguYTZdCrBqwP/EIyiJr+AFLnJYarRyySGUD6VXOG4pc9Wp+3fjGB2WNhfet/yU3U41uctoBG1/8vJ73e4/jPUuheo5Olf9aF+aoAAFRCINtw8LfMpffoaBl10r7WmvGivb6quJfxU2S/fPndDHQBIwqowjYgg1I/y8IzwD8DAjU5EIdAAJjt2/S7EfIILkI6U3VnaVY5yXKhqWVfB50RG9jRX5tgtLscYT+XKLZWIJ/uiVLmBEmMLMFego6AOqSRc5nntEcwgHgJd/Uj9N0VT4/0Ze/sxIg7tkHuArrYNspKcCAwEAAaOB8zCB8DAdBgNVHQ4EFgQUYge5RGWbE/C3YdCqWcEtVIUltSIwgcAGA1UdIwSBuDCBtYAUYge5RGWbE/C3YdCqWcEtVIUltSKhgZGkgY4wgYsxCzAJBgNVBAYTAkRFMRAwDgYDVQQIEwdCYWQtV3VlMRMwEQYDVQQHEwpIZWlkZWxiZXJnMRAwDgYDVQQKEwdhZGQyd2ViMREwDwYDVQQLEwhXZWJhZG1pbjELMAkGA1UEAxMCQUUxIzAhBgkqhkiG9w0BCQEWFHdlYm1hc3RlckBhZGQyd2ViLmRlggkA6iNf6TNqB9MwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAwZUtNNzhKzcow7k3TrYyDhttWuT5cFb6wGg/4phmoQ9imdHZdkyopi7hDO+SoJXQqm+kXLYfZk6TZbmG6b4l9iYYNJ+st02Zdem8xeaFpI7vzTIHqStYw2pqfQ9NuGRLSjL9ltMVvQ34+tUSdTV3WreUEb+YHY1Jpo9YAMijKqjE/mlF8sqi3kGHxAMrK+uf3pV8bz3oJuZjije9Oz/d+RUcEz8BDOjxiexWXqrXf5jj4TQKihTnXBOWQCbMgT52OYSCgO0wLaOXT0Jv6NKNDuTFaHdjtMJ5p231+vubt/o1tPSglxAWGNwXOch6PLsXhTAKmCMA+u0/ff9RWoqL2w==
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de
|-Issuer  : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de
|-Issuer  : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 520

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 642

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : https://172.21.11.250:8080/js/jquery.min.js
  Installed version : 2.1.3
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


INFOID: 24

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

http://172.21.11.250:8081/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------
Nessus was able to exploit the issue using the following request :

http://172.21.11.250:443/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

http://172.21.11.250:8081/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------
Nessus was able to exploit the issue using the following request :

http://172.21.11.250:443/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 203

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : May 02 01:14:29 2012 GMT
Valid To            : Apr 27 01:14:29 2032 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de
|-Issuer  : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de
|-Issuer  : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 520

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 24

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.37 (ciproc intern) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:50:24 2022-03-26 22:22:34
WAFs detected:
  • 172.21.172.37
  • No reverse DNS entries
  • 172.21.172.37
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp21ftp
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp21ftp
tcp443https?
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
MEDIUMID: 205

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : CN=wiki.ciproc.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : Aug 01 10:28:30 2014 GMT
Valid To            : Jul 29 10:28:30 2024 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID: 246

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=wiki.ciproc.de
|-Issuer  : CN=wiki.ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 306

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=wiki.ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 468

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 524

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 151

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


LOWID: 378

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 413

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 706

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 35

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 516 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 468

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 524

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 151

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


LOWID: 378

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 413

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 706

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 35

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 539 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.31 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:04:30 2022-03-26 22:34:32
WAFs detected:
  • 172.21.198.31
  • No reverse DNS entries
  • 172.21.198.31
  • No reverse DNS entries
OS detected: Microsoft Windows Server 2012 R2 Linux Kernel 3.1
Ports detected:
Protocol Port Service
tcp80www
tcp443https?
tcp999ssh
Protocol Port Service
tcp80www
tcp443https?
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : http://172.21.198.31/
  Installed version : 1.14.2
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.31/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.31/
  Installed version : 1.14.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0
MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.31/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4

172.21.11.221 (ISP) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:52:40 2022-03-26 22:21:06
WAFs detected:
  • 172.21.11.221
  • No reverse DNS entries
  • 172.21.11.221
  • No reverse DNS entries
OS detected: Linux Kernel 3.1 Linux Kernel 3.1
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.16.1 / 1.17.3
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


HIGHID:

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.16.1 / 1.17.3
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


MEDIUMID: 238

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.20.1 / 1.21.0
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.20.1 / 1.21.0
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0
MEDIUMID: 238

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4

172.21.11.230 (ISP) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:44:04 2022-03-26 22:07:27
WAFs detected:
  • 172.21.11.230
  • No reverse DNS entries
  • 172.21.11.230
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
MEDIUMID: 121

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

https://172.21.11.230/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 202

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : CN=spider01
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : Apr 23 13:53:20 2014 GMT
Valid To            : Apr 20 13:53:20 2024 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID: 239

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=spider01
|-Issuer  : CN=spider01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 300

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=spider01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 519

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 23

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 239

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=spider01
|-Issuer  : CN=spider01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 202

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : CN=spider01
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : Apr 23 13:53:20 2014 GMT
Valid To            : Apr 20 13:53:20 2024 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID: 300

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=spider01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 519

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 23

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.17.11 (VulnLIB) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:47:18 2022-03-26 22:23:28
WAFs detected:
  • 172.21.17.11
  • No reverse DNS entries
  • 172.21.17.11
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Vulnerabilities detected:
CRITICALID: 354

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u4
  Installed version   : 5.4.45-0+deb7u4
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.11:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596479')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID: 461

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.11:9292/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.11:9292/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 372

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 406

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 699

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 25

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.11:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648328907')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e0d3-343-50ed2ef0bc400"
  Inode number           : 254163
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT
Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e0d3-343-50ed2ef0bc400"
  Inode number           : 254163
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e0d3-343-50ed2ef0bc400"
  Inode number           : 254163
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT
Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e0d3-343-50ed2ef0bc400"
  Inode number           : 254163
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 461

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 372

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 406

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 699

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 25

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.17.12 (VulnLIB) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:47:20 2022-03-26 22:23:42
WAFs detected:
  • 172.21.17.12
  • No reverse DNS entries
  • 172.21.17.12
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Vulnerabilities detected:
CRITICALID: 355

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u4
  Installed version   : 5.4.45-0+deb7u4
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.12/?"><script>alert('struts_sa_surl_xss.nasl-1647596487')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID: 462

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : http://172.21.17.12/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.12/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.12/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 373

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 407

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 700

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 26

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.12:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648328936')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.12/?"><script>alert('struts_sa_surl_xss.nasl-1648328935')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.12:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648328936')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.12/?"><script>alert('struts_sa_surl_xss.nasl-1648328935')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT
Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT
Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 462

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 373

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 407

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 700

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 26

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.105 (monkeySYS) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:54:09 2022-03-26 22:28:48
WAFs detected:
  • 172.21.172.105
  • No reverse DNS entries
  • 172.21.172.105
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
Vulnerabilities detected:
MEDIUMID: 250

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=ponkeyAGENTS
|-Issuer  : CN=ponkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 221

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 310

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=ponkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 528

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 43

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

https://172.21.172.105/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 221

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 250

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=ponkeyAGENTS
|-Issuer  : CN=ponkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 310

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=ponkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 528

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 43

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.5 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:14:08 2022-03-26 22:44:06
WAFs detected:
  • 172.21.198.5
  • No reverse DNS entries
  • 172.21.198.5
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 3.1
Ports detected:
Protocol Port Service
tcp21ftp
tcp25smtp
tcp53dns
tcp80www
tcp1063com-tsmux?
tcp110pop3
tcp143imap
tcp443www
tcp465smtp
tcp993imap
tcp995pop3
tcp999ssh
tcp8443www
tcp8880www
Protocol Port Service
tcp21ftp
tcp25smtp
tcp53dns
tcp80www
tcp1063com-tsmux?
tcp110pop3
tcp143imap
tcp443www
tcp465smtp
tcp993imap
tcp995pop3
tcp999ssh
tcp8443www
tcp8880www
Vulnerabilities detected:
MEDIUMID:

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN DIGEST-MD5 CRAM-MD5

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID:

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN DIGEST-MD5 CRAM-MD5

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.198.20 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:01:45 2022-03-26 22:32:45
WAFs detected:
  • 172.21.198.20
  • No reverse DNS entries
  • 172.21.198.20
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID: 615

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


MEDIUMID: 586

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.12.1

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID: 596

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID: 624

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID: 662

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 61

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 624

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID: 61

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.21 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:02:28 2022-03-26 22:32:43
WAFs detected:
  • 172.21.198.21
  • No reverse DNS entries
  • 172.21.198.21
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID: 570

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID: 587

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID: 597

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID: 625

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID: 663

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 62

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 625

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID: 62

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.22 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:03:05 2022-03-26 22:33:13
WAFs detected:
  • 172.21.198.22
  • No reverse DNS entries
  • 172.21.198.22
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.23 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:03:08 2022-03-26 22:33:51
WAFs detected:
  • 172.21.198.23
  • No reverse DNS entries
  • 172.21.198.23
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID: 616

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


MEDIUMID: 589

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID: 599

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID: 627

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID: 665

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 64

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 627

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID: 64

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.110 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:04:03 2022-03-26 22:33:53
WAFs detected:
  • 172.21.198.110
  • No reverse DNS entries
  • 172.21.198.110
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.111 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:04:57 2022-03-26 22:35:13
WAFs detected:
  • 172.21.198.111
  • No reverse DNS entries
  • 172.21.198.111
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.112 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:05:52 2022-03-26 22:36:18
WAFs detected:
  • 172.21.198.112
  • No reverse DNS entries
  • 172.21.198.112
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID: 574

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID: 592

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID: 602

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID: 631

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID: 672

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 70

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 631

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID: 70

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.113 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:07:01 2022-03-26 22:38:46
WAFs detected:
  • 172.21.198.113
  • No reverse DNS entries
  • 172.21.198.113
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.250 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:10:54 2022-03-26 22:42:34
WAFs detected:
  • 172.21.198.250
  • No reverse DNS entries
  • 172.21.198.250
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp80www
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.198.251 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:10:59 2022-03-26 22:42:48
WAFs detected:
  • 172.21.198.251
  • No reverse DNS entries
  • 172.21.198.251
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp80www
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.199.19 (Hosting) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:21:40 2022-03-26 22:43:53
WAFs detected:
  • 172.21.199.19
  • No reverse DNS entries
  • 172.21.199.19
  • No reverse DNS entries
OS detected: Windows Server 2019 Standard 17763 Windows Server 2019 Standard 17763
Ports detected:
Protocol Port Service
tcp53dns
tcp88kerberos?
tcp135epmap
tcp139smb
tcp389ldap
tcp445cifs
tcp464kpasswd?
tcp593http-rpc-epmap
tcp636ldaps?
tcp1801msmq?
tcp2103dce-rpc
tcp2105dce-rpc
tcp2107dce-rpc
tcp3268ldap
tcp3269msft-gc-ssl?
tcp3387www
tcp3389msrdp
tcp5800www
tcp5900vnc
Protocol Port Service
tcp53dns
tcp88kerberos?
tcp135epmap
tcp139smb
tcp389ldap
tcp445cifs
tcp464kpasswd?
tcp593http-rpc-epmap
tcp636ldaps?
tcp1801msmq?
tcp2103dce-rpc
tcp2105dce-rpc
tcp2107dce-rpc
tcp3268ldap
tcp3269msft-gc-ssl?
tcp3387www
tcp3389msrdp
Vulnerabilities detected:
MEDIUMID: 209

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID: 213

The SSL certificate for this service is for a different host.

The identities known by Nessus are :

  172.21.199.19
  172.21.199.19

The Common Name in the certificate is :

  TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 264

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=TAU.hbmedia.lan
|-Issuer  : CN=TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 322

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 541

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 209

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID: 213

The SSL certificate for this service is for a different host.

The identities known by Nessus are :

  172.21.199.19
  172.21.199.19

The Common Name in the certificate is :

  TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 264

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=TAU.hbmedia.lan
|-Issuer  : CN=TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 322

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 541

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.199.201 (Hosting) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:20:13 2022-03-26 22:50:08
WAFs detected:
  • 172.21.199.201
  • No reverse DNS entries
  • 172.21.199.201
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp443www
tcp4040www
tcp8443www
tcp44337kerio_mailserver_admin
Protocol Port Service
tcp111rpc-portmapper
tcp443www
tcp4040www
tcp8443www
tcp44337kerio_mailserver_admin
Vulnerabilities detected:
MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID:

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=mail.hbmedia.net
  Issuer           : C=US, O=Let's Encrypt, CN=R3
  Not valid before : Dec 25 04:58:08 2021 GMT
  Not valid after  : Mar 25 04:58:07 2022 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject   : CN=mail.hbmedia.net
|-Not After : Mar 25 04:58:07 2022 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.221.24 (Telephony) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:15:17 2022-03-26 22:46:02
WAFs detected:
  • 172.21.221.24
  • No reverse DNS entries
  • 172.21.221.24
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) FreePBX SIP Device
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-221-4f4552e1ea380"
  Inode number           : 107516
  File size              : 545 bytes
  File modification time : Mar. 11, 2014 at 14:03:10 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-221-4f4552e1ea380"
  Inode number           : 107516
  File size              : 545 bytes
  File modification time : Mar. 11, 2014 at 14:03:10 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.238 (Telephony) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:48:22 2022-03-26 23:19:31
WAFs detected:
  • 172.21.221.238
  • No reverse DNS entries
  • 172.21.221.238
  • No reverse DNS entries
OS detected: Asterisk SIP Device Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp8001www
tcp8003www
tcp8088www
tcp8089www
Protocol Port Service
tcp80www
tcp999ssh
tcp8001www
tcp8003www
tcp8088www
tcp8089www
Vulnerabilities detected:
MEDIUMID: 350

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-buster-b/O=tel-buster-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 293

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has an invalid signature :

|-Subject : CN=tel-buster-b/O=tel-buster-b
|-Hash    : 

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-buster-b/O=tel-buster-b
|-Issuer  : CN=tel-buster-b/O=tel-buster-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 568

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 100

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 350

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-buster-b/O=tel-buster-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 293

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has an invalid signature :

|-Subject : CN=tel-buster-b/O=tel-buster-b
|-Hash    : 

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-buster-b/O=tel-buster-b
|-Issuer  : CN=tel-buster-b/O=tel-buster-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 568

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 100

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.17 (ISP) LOW CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:40:32 2022-03-26 22:07:15
WAFs detected:
  • 172.21.46.59
  • wp-info.ciproc.de
  • 172.21.46.59
  • wp-info.ciproc.de
OS detected: Ubuntu 14.04 Linux Kernel 3.13 Ubuntu 14.04 Linux Kernel 3.13
Ports detected:
Protocol Port Service
tcp25smtp
tcp110pop3
Protocol Port Service
tcp25smtp
tcp110pop3
Vulnerabilities detected:
MEDIUMID: 513

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 232

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 142

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A
LOWID: 142

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.1.1 (Gateways) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:34:30 2022-03-26 22:03:30
WAFs detected:
  • 172.21.1.1
  • dns.devmonkey.ciproc
  • dns.ali.ciproc
  • 172.21.1.1
  • dns.devmonkey.ciproc
  • dns.ali.ciproc
OS detected: Unknown Unknown
Ports detected:
Protocol Port Service
tcp53domain?
Protocol Port Service
tcp53dns
Vulnerabilities detected: None
INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.174.32 (darkhill) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:04:10 2022-03-26 22:27:26
WAFs detected:
  • 172.21.174.32
  • No reverse DNS entries
  • 172.21.174.32
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp80www
tcp111rpc-portmapper
tcp443www
tcp999ssh
Protocol Port Service
tcp80http?
tcp111sunrpc?
tcp443https?
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 259

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=web02.alevi.de
|-Issuer  : CN=web02.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 319

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=web02.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 537

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 56

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 114

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
INFOID: 56

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.24 (publior) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:02:47 2022-03-26 22:33:53
WAFs detected:
  • 172.21.198.24
  • No reverse DNS entries
  • 172.21.198.24
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 666

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.24/
  Installed version : 1.18.0
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 65

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 65

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.30 (publior) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:12:15 2022-03-26 22:41:32
WAFs detected:
  • 172.21.198.30
  • No reverse DNS entries
  • 172.21.198.30
  • No reverse DNS entries
OS detected: Ubuntu 14.04 Linux Kernel 3.13 Ubuntu 14.04 Linux Kernel 3.13
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp5222ejabberd
tcp5269jabber_s2s
tcp8888www
Protocol Port Service
tcp80www
tcp999ssh
tcp5222ejabberd
tcp5269jabber_s2s
tcp8888www
Vulnerabilities detected:
MEDIUMID: 667

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.30/
  Installed version : 1.18.0
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 66

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 66

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.32 (publior) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:03:52 2022-03-26 22:34:10
WAFs detected:
  • 172.21.198.32
  • No reverse DNS entries
  • 172.21.198.32
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.32/
  Installed version : 1.18.0
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.114 (publior) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:08:38 2022-03-26 22:38:23
WAFs detected:
  • 172.21.198.114
  • No reverse DNS entries
  • 172.21.198.114
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 674

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.114/
  Installed version : 1.18.0
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 72

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 72

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.43 (Telephony) CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:15:22 2022-03-26 22:46:02
WAFs detected:
  • 172.21.221.43
  • No reverse DNS entries
  • 172.21.221.43
  • No reverse DNS entries
OS detected: FreePBX SIP Device Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected: None None

172.21.0.2 (Hosts) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:39:35 2022-03-26 22:09:02
WAFs detected:
  • 172.21.0.2
  • No reverse DNS entries
  • 172.21.0.2
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp53dns
tcp80www
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp53dns
tcp80www
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
CRITICALID: 157

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 133

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 1

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 104

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
CRITICALID: 157

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 133

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 1

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 104

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.0.16 (Hosts) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:39:35 2022-03-26 22:09:00
WAFs detected:
  • 172.21.0.16
  • No reverse DNS entries
  • 172.21.0.16
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 on Debian 6.0 (squeeze) Linux Kernel 2.6 on Debian 6.0 (squeeze)
Ports detected:
Protocol Port Service
tcp53dns
tcp80www
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp53dns
tcp80www
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
CRITICALID: 158

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


HIGHID: 639

The remote name server is affected by an assertion failure vulnerability.

Installed version : 9.7.3
  Fixed version     : 9.11.19

Upgrade to the patched release most closely related to your current version of BIND.

CVE:CVE-2020-8617
CWE:N/A
VPR:5.1


MEDIUMID: 134

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 439

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3c8835-b1-4c12d8ed73440"
  Inode number           : 3967029
  File size              : 177 bytes
  File modification time : May. 29, 2012 at 14:22:01 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 460

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 637

The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.

Installed version : 9.7.3
  Fixed version     : 9.11.19

Upgrade to the ISC BIND version referenced in the vendor advisory.

CVE:CVE-2020-8616
CWE:N/A
VPR:5.2


MEDIUMID: 648

The remote name server is affected by a denial of service vulnerability.

Installed version : 9.7.3
  Fixed version     : 9.11.22, 9.16.6, 9.17.4 or later

Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.

CVE:CVE-2020-8622
CWE:N/A
VPR:4.4


LOWID: 371

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 405

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 698

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 6

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 108

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
CRITICALID: 158

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


HIGHID: 639

The remote name server is affected by an assertion failure vulnerability.

Installed version : 9.7.3
  Fixed version     : 9.11.19

Upgrade to the patched release most closely related to your current version of BIND.

CVE:CVE-2020-8617
CWE:N/A
VPR:5.1


MEDIUMID: 134

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 439

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3c8835-b1-4c12d8ed73440"
  Inode number           : 3967029
  File size              : 177 bytes
  File modification time : May. 29, 2012 at 14:22:01 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 460

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 637

The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.

Installed version : 9.7.3
  Fixed version     : 9.11.19

Upgrade to the ISC BIND version referenced in the vendor advisory.

CVE:CVE-2020-8616
CWE:N/A
VPR:5.2


MEDIUMID: 648

The remote name server is affected by a denial of service vulnerability.

Installed version : 9.7.3
  Fixed version     : 9.11.22, 9.16.6, 9.17.4 or later

Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.

CVE:CVE-2020-8622
CWE:N/A
VPR:4.4


LOWID: 371

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 405

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 698

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 6

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 108

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.11.121 (ISP) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:42:03 2022-03-26 22:10:48
WAFs detected:
  • 172.21.11.121
  • No reverse DNS entries
  • 172.21.11.121
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 160

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 235

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=sysmonkeyWEB
|-Issuer  : CN=sysmonkeyWEB

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 298

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=sysmonkeyWEB

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 516

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 641

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : https://172.21.11.121/lib/3rd_party/jquery/jquery.js
  Installed version : 1.7.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


INFOID: 20

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 160

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 235

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=sysmonkeyWEB
|-Issuer  : CN=sysmonkeyWEB

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 298

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=sysmonkeyWEB

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 516

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 641

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : https://172.21.11.121/lib/3rd_party/jquery/jquery.js
  Installed version : 1.7.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


INFOID: 20

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.17.14 (VulnLIB) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:56:58 2022-03-26 22:25:20
WAFs detected:
  • 172.21.17.14
  • No reverse DNS entries
  • 172.21.17.14
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Vulnerabilities detected:
CRITICALID: 357

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u4
  Installed version   : 5.4.45-0+deb7u4
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596523')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1647596522')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596523')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1647596522')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 464

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 375

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 409

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 702

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 28

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 357

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u4
  Installed version   : 5.4.45-0+deb7u4
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329034')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1648329033')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329034')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1648329033')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 464

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 375

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 409

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 702

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 28

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.146 (monkeySYS) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:57:52 2022-03-26 22:29:57
WAFs detected:
  • 172.21.172.146
  • donkeyA01.devmonkey.ciproc
  • 172.21.172.146
  • donkeyA01.devmonkey.ciproc
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
tcp3306mysql
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 163

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 127

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

https://donkeyA01.devmonkey.ciproc/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 223

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 252

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=sysmonkey
|-Issuer  : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 312

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 530

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 45

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 163

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 127

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

https://172.21.172.146/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 223

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 252

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=sysmonkey
|-Issuer  : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 312

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 530

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 45

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.173.11 (darkhill) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:07:57 2022-03-26 22:37:08
WAFs detected:
  • 172.21.173.11
  • No reverse DNS entries
  • 172.21.173.11
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 164

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 254

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=horde.eitun.de
|-Issuer  : CN=horde.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 314

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=horde.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 469

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 532

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 49

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1034 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 164

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 254

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=horde.eitun.de
|-Issuer  : CN=horde.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 314

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=horde.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 469

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 532

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 49

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1045 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.230 (publior) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:10:12 2022-03-26 22:42:15
WAFs detected:
  • 172.21.198.230
  • No reverse DNS entries
  • 172.21.198.230
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp389ldap
tcp443www
tcp999ssh
Protocol Port Service
tcp389ldap
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 3 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.220.11 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:21:37 2022-03-26 22:51:33
WAFs detected:
  • 172.21.220.11
  • No reverse DNS entries
  • 172.21.220.11
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp389ldap
tcp443www
tcp999ssh
tcp5060sip
tcp5061sip
Protocol Port Service
tcp80www
tcp389ldap
tcp443www
tcp999ssh
tcp5060sip
tcp5061sip
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=ciproc.nextgentel.de, O=Ciproc GmbH
  Issuer           : CN=Asterisk Private CA, O=Ciproc GmbH
  Not valid before : Mar 22 19:12:24 2020 GMT
  Not valid after  : Mar 22 19:12:24 2021 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-DES-CBC3-SHA        0xC0, 0x12       ECDH          RSA      3DES-CBC(168)          SHA1
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b
The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b
The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service supports the use of the RC4 cipher.

List of RC4 cipher suites supported by the remote server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-RC4-SHA             0xC0, 0x11       ECDH          RSA      RC4(128)               SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1
    RC4-MD5                       0x00, 0x04       RSA           RSA      RC4(128)               MD5
    RC4-SHA                       0x00, 0x05       RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

CVE:CVE-2013-2566, CVE-2015-2808
CWE:N/A
VPR:3.6


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


LOWID:

The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.

The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :

|-Subject        : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-RSA Key Length : 1024 bits

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=ciproc.nextgentel.de, O=Ciproc GmbH
  Issuer           : CN=Asterisk Private CA, O=Ciproc GmbH
  Not valid before : Mar 22 19:12:24 2020 GMT
  Not valid after  : Mar 22 19:12:24 2021 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-DES-CBC3-SHA        0xC0, 0x12       ECDH          RSA      3DES-CBC(168)          SHA1
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service supports the use of the RC4 cipher.

List of RC4 cipher suites supported by the remote server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-RC4-SHA             0xC0, 0x11       ECDH          RSA      RC4(128)               SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1
    RC4-MD5                       0x00, 0x04       RSA           RSA      RC4(128)               MD5
    RC4-SHA                       0x00, 0x05       RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

CVE:CVE-2013-2566, CVE-2015-2808
CWE:N/A
VPR:3.6


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


LOWID:

The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.

The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :

|-Subject        : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-RSA Key Length : 1024 bits

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.220.12 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:20:57 2022-03-26 22:50:43
WAFs detected:
  • 172.21.220.12
  • No reverse DNS entries
  • 172.21.220.12
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp389ldap
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp389ldap
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 167

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 268

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 325

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 544

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 83

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 167

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 268

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 325

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 544

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 83

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.9 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:14:09 2022-03-26 22:44:46
WAFs detected:
  • 172.21.221.9
  • No reverse DNS entries
  • 172.21.221.9
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 on Debian 6.0 (squeeze) Linux Kernel 2.6 on Debian 6.0 (squeeze)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 169

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 442

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-25a-4b2015ecc4780"
  Inode number           : 107516
  File size              : 602 bytes
  File modification time : Nov. 18, 2011 at 12:21:02 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 471

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 380

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 415

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 711

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 169

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 442

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-25a-4b2015ecc4780"
  Inode number           : 107516
  File size              : 602 bytes
  File modification time : Nov. 18, 2011 at 12:21:02 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 471

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 380

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 415

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 711

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.26 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:16:10 2022-03-26 22:46:29
WAFs detected:
  • 172.21.221.26
  • No reverse DNS entries
  • 172.21.221.26
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.31 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:16:57 2022-03-26 22:48:32
WAFs detected:
  • 172.21.221.31
  • No reverse DNS entries
  • 172.21.221.31
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u13
  Installed version   : 5.4.45-0+deb7u13
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13)
  Installed version : 5.4.45-0+deb7u13
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13)
  Installed version : 5.4.45-0+deb7u13
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID:

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u13
  Installed version   : 5.4.45-0+deb7u13
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13)
  Installed version : 5.4.45-0+deb7u13
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13)
  Installed version : 5.4.45-0+deb7u13
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.45 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:31:33 2022-03-26 23:01:25
WAFs detected:
  • 172.21.221.45
  • No reverse DNS entries
  • 172.21.221.45
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.52 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:25:13 2022-03-26 22:55:51
WAFs detected:
  • 172.21.221.52
  • No reverse DNS entries
  • 172.21.221.52
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.53 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:34:40 2022-03-26 23:04:53
WAFs detected:
  • 172.21.221.53
  • No reverse DNS entries
  • 172.21.221.53
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 173

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 270

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 327

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 546

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 173

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 270

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 327

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 546

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.54 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:26:14 2022-03-26 22:57:55
WAFs detected:
  • 172.21.221.54
  • No reverse DNS entries
  • 172.21.221.54
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 174

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 271

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 328

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 547

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 174

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 271

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 328

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 547

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.55 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:26:48 2022-03-26 22:58:06
WAFs detected:
  • 172.21.221.55
  • No reverse DNS entries
  • 172.21.221.55
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.56 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:26:48 2022-03-26 22:57:56
WAFs detected:
  • 172.21.221.56
  • No reverse DNS entries
  • 172.21.221.56
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.59 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:27:38 2022-03-26 22:58:33
WAFs detected:
  • 172.21.221.59
  • No reverse DNS entries
  • 172.21.221.59
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 178

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 274

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 331

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 550

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 178

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 274

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 331

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 550

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.61 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:27:44 2022-03-26 22:59:24
WAFs detected:
  • 172.21.221.61
  • No reverse DNS entries
  • 172.21.221.61
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
Protocol Port Service
tcp443www
Vulnerabilities detected:
CRITICALID: 179

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 275

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 332

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 551

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 179

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 275

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 332

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 551

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.62 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:37:00 2022-03-26 23:08:07
WAFs detected:
  • 172.21.221.62
  • No reverse DNS entries
  • 1