VLAN418_RADI – 10.44.102.215

VLAN: 418CIDR: 10.44.100.0/22, 193.224.48.64/27, 192.9.200.0/24NAT: 193.224.49.26Nessus mappa: 1472
Scan: RADIDátum: 2026-01-30 16:08
Ollama alapú vezetői elemzés

Összkép:
A vizsgált rendszerben több kritikus biztonsági hiányosság található, amelyek komoly kockázatot jelentenek a rendszerbiztonság szempontjából. A legfontosabb megelőzési lépések között szerepel az összes kritikus és magas prioritású biztonsági hiányosságoknak történő kijavítása.

Fő kockázati témák:
A vizsgált rendszerben több kritikus biztonsági hiányosság található, például a TLS 1.0 és 1.1 protokollok támogatása, valamint az RC4 és SSLv3 használata.

Ajánlott 0–7 nap:
A kritikus és magas prioritású biztonsági hiányosságok kijavítása a legfontosabb lépés. A TLS 1.2 és 1.3 protokollok támogatását kell bekapcsolni, valamint az RC4 és SSLv3 használatának leállítani.

Ajánlott 7–30 nap:
A rendszer hardening-je és újraszkennelése szükséges a biztonságosabbá tétel

Kritikus (3 típus / 3 összes)
  1. SSL Version 2 and 3 Protocol Detection
  2. Microsoft SQL Server Unsupported Version Detection (remote check)
  3. Unsupported Windows OS (remote)
Magas (1 típus / 2 összes)
  1. SSL Medium Strength Cipher Suites Supported (SWEET32)
Közepes (11 típus / 20 összes)
  1. Remote Desktop Protocol Server Man-in-the-Middle Weakness
  2. SSL Certificate Signed Using Weak Hashing Algorithm
  3. SSL Certificate with Wrong Hostname
  4. SSL Certificate Cannot Be Trusted
  5. SSL Self-Signed Certificate
  6. SMB Signing not required
  7. Terminal Services Encryption Level is Medium or Low
  8. Terminal Services Doesn't Use Network Level Authentication (NLA) Only
  9. SSL RC4 Cipher Suites Supported (Bar Mitzvah)
  10. TLS Version 1.0 Protocol Detection
  11. TLS Version 1.1 Deprecated Protocol
Ollama: llama3.1:8b | ollama version is 0.14.2 | 2026-01-30 21:15

CRITICAL (3)

SSL Version 2 and 3 Protocol Detection
Plugin ID: 20007 Port: tcp/1433
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including: - An insecure padding scheme with CBC ciphers. - Insecure session renegotiation and resumption schemes. An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients. Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely. NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'.
Javasolt megoldás
Consult the application's documentation to disable SSL 2.0 and 3.0. Use TLS 1.2 (with approved cipher suites) or higher instead.
Microsoft SQL Server Unsupported Version Detection (remote check)
Plugin ID: 73756 Port: tcp/1433
According to its self-reported version number, the installation of Microsoft SQL Server on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.
Javasolt megoldás
Upgrade to a version of Microsoft SQL Server that is currently supported.
Unsupported Windows OS (remote)
Plugin ID: 108797 Port: tcp/0
The remote version of Microsoft Windows is either missing a service pack or is no longer supported. As a result, it is likely to contain security vulnerabilities.
Javasolt megoldás
Upgrade to a supported service pack or operating system

HIGH (2)

SSL Medium Strength Cipher Suites Supported (SWEET32)
Plugin ID: 42873 Port: tcp/1433 CVE: CVE-2016-2183
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite. Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
Javasolt megoldás
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
SSL Medium Strength Cipher Suites Supported (SWEET32)
Plugin ID: 42873 Port: tcp/3389 CVE: CVE-2016-2183
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite. Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
Javasolt megoldás
Reconfigure the affected application if possible to avoid use of medium strength ciphers.

MEDIUM (20)

Remote Desktop Protocol Server Man-in-the-Middle Weakness
Plugin ID: 18405 Port: tcp/3389 CVE: CVE-2005-1794
The remote version of the Remote Desktop Protocol Server (Terminal Service) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP client makes no effort to validate the identity of the server when setting up encryption. An attacker with the ability to intercept traffic from the RDP server can establish encryption with the client and server without being detected. A MiTM attack of this nature would allow the attacker to obtain any sensitive information transmitted, including authentication credentials. This flaw exists because the RDP server stores a publicly known hard-coded RSA private key. Any attacker in a privileged network location can use the key for this attack.
Javasolt megoldás
- Force the use of SSL as a transport layer for this service if supported, or/and - On Microsoft Windows operating systems, select the 'Allow connections only from computers running Remote Desktop with Network Level Authentication' setting if it is available.
SSL Certificate Signed Using Weak Hashing Algorithm
Plugin ID: 35291 Port: tcp/1433 CVE: CVE-2004-2761
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service. Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm. Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been ignored.
Javasolt megoldás
Contact the Certificate Authority to have the SSL certificate reissued.
SSL Certificate Signed Using Weak Hashing Algorithm
Plugin ID: 35291 Port: tcp/1433 CVE: CVE-2005-4900
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service. Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm. Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been ignored.
Javasolt megoldás
Contact the Certificate Authority to have the SSL certificate reissued.
SSL Certificate Signed Using Weak Hashing Algorithm
Plugin ID: 35291 Port: tcp/3389 CVE: CVE-2004-2761
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service. Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm. Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been ignored.
Javasolt megoldás
Contact the Certificate Authority to have the SSL certificate reissued.
SSL Certificate Signed Using Weak Hashing Algorithm
Plugin ID: 35291 Port: tcp/3389 CVE: CVE-2005-4900
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service. Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm. Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been ignored.
Javasolt megoldás
Contact the Certificate Authority to have the SSL certificate reissued.
SSL Certificate with Wrong Hostname
Plugin ID: 45411 Port: tcp/1433
The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192 Port: tcp/1433
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192 Port: tcp/3389
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Self-Signed Certificate
Plugin ID: 57582 Port: tcp/1433
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Self-Signed Certificate
Plugin ID: 57582 Port: tcp/3389
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SMB Signing not required
Plugin ID: 57608 Port: tcp/445
Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.
Javasolt megoldás
Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
Terminal Services Encryption Level is Medium or Low
Plugin ID: 57690 Port: tcp/3389
The remote Terminal Services service is not configured to use strong cryptography. Using weak cryptography with this service may allow an attacker to eavesdrop on the communications more easily and obtain screenshots and/or keystrokes.
Javasolt megoldás
Change RDP encryption level to one of : 3. High 4. FIPS Compliant
Terminal Services Doesn't Use Network Level Authentication (NLA) Only
Plugin ID: 58453 Port: tcp/3389
The remote Terminal Services is not configured to use Network Level Authentication (NLA) only. NLA uses the Credential Security Support Provider (CredSSP) protocol to perform strong server authentication either through TLS/SSL or Kerberos mechanisms, which protect against man-in-the-middle attacks. In addition to improving authentication, NLA also helps protect the remote computer from malicious users and software by completing user authentication before a full RDP connection is established.
Javasolt megoldás
Enable Network Level Authentication (NLA) on the remote RDP server. This is generally done on the 'Remote' tab of the 'System' settings on Windows.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
Plugin ID: 65821 Port: tcp/1433 CVE: CVE-2013-2566
The remote host supports the use of RC4 in one or more cipher suites. The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
Plugin ID: 65821 Port: tcp/1433 CVE: CVE-2015-2808
The remote host supports the use of RC4 in one or more cipher suites. The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
Plugin ID: 65821 Port: tcp/3389 CVE: CVE-2013-2566
The remote host supports the use of RC4 in one or more cipher suites. The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
Plugin ID: 65821 Port: tcp/3389 CVE: CVE-2015-2808
The remote host supports the use of RC4 in one or more cipher suites. The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
TLS Version 1.0 Protocol Detection
Plugin ID: 104743 Port: tcp/1433
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible. As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors. PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.
Javasolt megoldás
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
TLS Version 1.0 Protocol Detection
Plugin ID: 104743 Port: tcp/3389
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible. As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors. PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.
Javasolt megoldás
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
TLS Version 1.1 Deprecated Protocol
Plugin ID: 157288 Port: tcp/3389
The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.
Javasolt megoldás
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.

LOW (6)

ICMP Timestamp Request Remote Date Disclosure
Plugin ID: 10114 Port: icmp/0 CVE: CVE-1999-0524
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols. Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Javasolt megoldás
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Terminal Services Encryption Level is not FIPS-140 Compliant
Plugin ID: 30218 Port: tcp/3389
The encryption setting used by the remote Terminal Services service is not FIPS-140 compliant.
Javasolt megoldás
Change RDP encryption level to : 4. FIPS Compliant
SSL Certificate Chain Contains RSA Keys Less Than 2048 bits
Plugin ID: 69551 Port: tcp/1433
At least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/Browser (CA/B) Forum, certificates issued after January 1, 2014 must be at least 2048 bits. Some browser SSL implementations may reject keys less than 2048 bits after January 1, 2014. Additionally, some SSL certificate vendors may revoke certificates less than 2048 bits before January 1, 2014. Note that Nessus will not flag root certificates with RSA keys less than 2048 bits if they were issued prior to December 31, 2010, as the standard considers them exempt.
Javasolt megoldás
Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)
Plugin ID: 78479 Port: tcp/1433 CVE: CVE-2014-3566
The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1 or newer is supported by the client and service. The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients; however, it can only protect connections when the client and service support the mechanism. Sites that cannot disable SSLv3 immediately should enable this mechanism. This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is the only way to completely mitigate the vulnerability.
Javasolt megoldás
Disable SSLv3. Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)
Plugin ID: 83875 Port: tcp/1433 CVE: CVE-2015-4000
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount of time (depending on modulus size and attacker resources). This may allow an attacker to recover the plaintext or potentially violate the integrity of connections.
Javasolt megoldás
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.
SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)
Plugin ID: 83875 Port: tcp/3389 CVE: CVE-2015-4000
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount of time (depending on modulus size and attacker resources). This may allow an attacker to recover the plaintext or potentially violate the integrity of connections.
Javasolt megoldás
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.