Ollama alapú vezetői elemzésÖsszkép: A vizsgált rendszerben két közepes és egy alacsony sérülékenység volt kimutatva, amelyek a biztonsági szintjét KÖZEPES szintűvé teszik. A sürgősség TERVEZHETŐ (7–30 nap), de fontos megoldani azokat a problémákat, amelyek gyorsan kezelhetők.
Fő kockázati témák: A legfontosabb kockázatok közé tartozik a SSL Certificate Cannot Be Trusted és a SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795), mivel ezek kompromittálhatják az adatok biztonságát.
Ajánlott 0–7 nap: A legfontosabb, hogy megoldjuk a SSL Certificate Cannot Be Trusted problémát, és egy hiteles SSL tanúsítványt szerezzünk be. Ezen kívül fontos gyorsan kezelni az SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795) problémáját.
Ajánlott 7–30 nap: A rendszer biztonságának javításához és hardeningjéhez szükség van a kockázatok általános kezelésére, bele
Közepes (3 típus / 3 összes)- SSL Certificate Cannot Be Trusted
- SSL Self-Signed Certificate
- SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)
Ollama: llama3.1:8b | ollama version is 0.14.2 | 2026-01-30 18:41
MEDIUM (3)
SSL Certificate Cannot Be Trusted
Plugin ID: 51192
Port: tcp/6443
The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Self-Signed Certificate
Plugin ID: 57582
Port: tcp/6443
The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)
The remote SSH server is vulnerable to a man-in-the-middle prefix truncation weakness known as Terrapin. This can
allow a remote, man-in-the-middle attacker to bypass integrity checks and downgrade the connection's security.
Note that this plugin only checks for remote SSH servers that support either ChaCha20-Poly1305 or CBC with
Encrypt-then-MAC and do not support the strict key exchange countermeasures. It does not check for vulnerable software
versions.
Javasolt megoldás
Contact the vendor for an update with the strict key exchange countermeasures or disable the affected algorithms.
LOW (1)
ICMP Timestamp Request Remote Date Disclosure
The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date that is set on the targeted machine, which
may assist an unauthenticated, remote attacker in defeating time-based
authentication protocols.
Timestamps returned from machines running Windows Vista / 7 / 2008 /
2008 R2 are deliberately incorrect, but usually within 1000 seconds of
the actual system time.
Javasolt megoldás
Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).