CRITICAL (5)
SSL Version 2 and 3 Protocol Detection
Plugin ID: 20007
Port: tcp/1433
The remote service accepts connections encrypted using SSL 2.0 and/or
SSL 3.0. These versions of SSL are affected by several cryptographic
flaws, including:
- An insecure padding scheme with CBC ciphers.
- Insecure session renegotiation and resumption schemes.
An attacker can exploit these flaws to conduct man-in-the-middle
attacks or to decrypt communications between the affected service and
clients.
Although SSL/TLS has a secure means for choosing the highest supported
version of the protocol (so that these versions will be used only if
the client or server support nothing better), many web browsers
implement this in an unsafe way that allows an attacker to downgrade
a connection (such as in POODLE). Therefore, it is recommended that
these protocols be disabled entirely.
NIST has determined that SSL 3.0 is no longer acceptable for secure
communications. As of the date of enforcement found in PCI DSS v3.1,
any version of SSL will not meet the PCI SSC's definition of 'strong
cryptography'.
Javasolt megoldás
Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.2 (with approved cipher suites) or higher instead.
Microsoft Windows XP Unsupported Installation Detection
Plugin ID: 73182
Port: tcp/0
The remote host is running Microsoft Windows XP. Support for this
operating system by Microsoft ended April 8th, 2014.
Lack of support implies that no new security patches for the product
will be released by the vendor. As a result, it is likely to contain
security vulnerabilities. Furthermore, Microsoft is unlikely to
investigate or acknowledge reports of vulnerabilities.
Javasolt megoldás
Upgrade to a version of Windows that is currently supported.
Microsoft SQL Server Unsupported Version Detection (remote check)
Plugin ID: 73756
Port: tcp/1433
According to its self-reported version number, the installation of
Microsoft SQL Server on the remote host is no longer supported.
Lack of support implies that no new security patches for the product
will be released by the vendor. As a result, it is likely to contain
security vulnerabilities.
Javasolt megoldás
Upgrade to a version of Microsoft SQL Server that is currently
supported.
Unsupported Windows OS (remote)
Plugin ID: 108797
Port: tcp/0
The remote version of Microsoft Windows is either missing a service pack
or is no longer supported. As a result, it is likely to contain security
vulnerabilities.
Javasolt megoldás
Upgrade to a supported service pack or operating system
Microsoft RDP RCE (CVE-2019-0708) (BlueKeep) (uncredentialed check)
The remote host is affected by a remote code execution vulnerability in Remote Desktop Protocol (RDP). An
unauthenticated, remote attacker can exploit this, via a series of specially crafted requests, to execute arbitrary code.
Javasolt megoldás
Microsoft has released a set of patches for Windows XP, 2003, 2008, 7, and 2008 R2.
HIGH (24)
SMB NULL Session Authentication
The remote host is running and SMB protocol. It is possible to log into the browser or spoolss pipes using a NULL
session (i.e., with no login or password).
Depending on the configuration, it may be possible for an unauthenticated, remote attacker to leverage this issue to get
information about the remote host.
Javasolt megoldás
Please contact the product vendor for recommended solutions.
SMB NULL Session Authentication
The remote host is running and SMB protocol. It is possible to log into the browser or spoolss pipes using a NULL
session (i.e., with no login or password).
Depending on the configuration, it may be possible for an unauthenticated, remote attacker to leverage this issue to get
information about the remote host.
Javasolt megoldás
Please contact the product vendor for recommended solutions.
SMB NULL Session Authentication
The remote host is running and SMB protocol. It is possible to log into the browser or spoolss pipes using a NULL
session (i.e., with no login or password).
Depending on the configuration, it may be possible for an unauthenticated, remote attacker to leverage this issue to get
information about the remote host.
Javasolt megoldás
Please contact the product vendor for recommended solutions.
SSL Medium Strength Cipher Suites Supported (SWEET32)
The remote host supports the use of SSL ciphers that offer medium
strength encryption. Nessus regards medium strength as any encryption
that uses key lengths at least 64 bits and less than 112 bits, or
else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength
encryption if the attacker is on the same physical network.
Javasolt megoldás
Reconfigure the affected application if possible to avoid use of
medium strength ciphers.
MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya) (uncredentialed check)
The remote Windows host is affected by the following vulnerabilities :
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit these
vulnerabilities, via a specially crafted packet, to
execute arbitrary code. (CVE-2017-0143, CVE-2017-0144,
CVE-2017-0145, CVE-2017-0146, CVE-2017-0148)
- An information disclosure vulnerability exists in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit this, via a
specially crafted packet, to disclose sensitive
information. (CVE-2017-0147)
ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY are
four of multiple Equation Group vulnerabilities and exploits disclosed
on 2017/04/14 by a group known as the Shadow Brokers. WannaCry /
WannaCrypt is a ransomware program utilizing the ETERNALBLUE exploit,
and EternalRocks is a worm that utilizes seven Equation Group
vulnerabilities. Petya is a ransomware program that first utilizes
CVE-2017-0199, a vulnerability in Microsoft Office, and then spreads
via ETERNALBLUE.
Javasolt megoldás
Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016. Microsoft has also
released emergency patches for Windows operating systems that are no
longer supported, including Windows XP, 2003, and 8.
For unsupported Windows operating systems, e.g. Windows XP, Microsoft
recommends that users discontinue the use of SMBv1. SMBv1 lacks
security features that were included in later SMB versions. SMBv1 can
be disabled by following the vendor instructions provided in Microsoft
KB2696547. Additionally, US-CERT recommends that users block SMB
directly by blocking TCP port 445 on all network boundary devices. For
SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137
/ 138 on all network boundary devices.
MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya) (uncredentialed check)
The remote Windows host is affected by the following vulnerabilities :
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit these
vulnerabilities, via a specially crafted packet, to
execute arbitrary code. (CVE-2017-0143, CVE-2017-0144,
CVE-2017-0145, CVE-2017-0146, CVE-2017-0148)
- An information disclosure vulnerability exists in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit this, via a
specially crafted packet, to disclose sensitive
information. (CVE-2017-0147)
ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY are
four of multiple Equation Group vulnerabilities and exploits disclosed
on 2017/04/14 by a group known as the Shadow Brokers. WannaCry /
WannaCrypt is a ransomware program utilizing the ETERNALBLUE exploit,
and EternalRocks is a worm that utilizes seven Equation Group
vulnerabilities. Petya is a ransomware program that first utilizes
CVE-2017-0199, a vulnerability in Microsoft Office, and then spreads
via ETERNALBLUE.
Javasolt megoldás
Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016. Microsoft has also
released emergency patches for Windows operating systems that are no
longer supported, including Windows XP, 2003, and 8.
For unsupported Windows operating systems, e.g. Windows XP, Microsoft
recommends that users discontinue the use of SMBv1. SMBv1 lacks
security features that were included in later SMB versions. SMBv1 can
be disabled by following the vendor instructions provided in Microsoft
KB2696547. Additionally, US-CERT recommends that users block SMB
directly by blocking TCP port 445 on all network boundary devices. For
SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137
/ 138 on all network boundary devices.
MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya) (uncredentialed check)
The remote Windows host is affected by the following vulnerabilities :
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit these
vulnerabilities, via a specially crafted packet, to
execute arbitrary code. (CVE-2017-0143, CVE-2017-0144,
CVE-2017-0145, CVE-2017-0146, CVE-2017-0148)
- An information disclosure vulnerability exists in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit this, via a
specially crafted packet, to disclose sensitive
information. (CVE-2017-0147)
ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY are
four of multiple Equation Group vulnerabilities and exploits disclosed
on 2017/04/14 by a group known as the Shadow Brokers. WannaCry /
WannaCrypt is a ransomware program utilizing the ETERNALBLUE exploit,
and EternalRocks is a worm that utilizes seven Equation Group
vulnerabilities. Petya is a ransomware program that first utilizes
CVE-2017-0199, a vulnerability in Microsoft Office, and then spreads
via ETERNALBLUE.
Javasolt megoldás
Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016. Microsoft has also
released emergency patches for Windows operating systems that are no
longer supported, including Windows XP, 2003, and 8.
For unsupported Windows operating systems, e.g. Windows XP, Microsoft
recommends that users discontinue the use of SMBv1. SMBv1 lacks
security features that were included in later SMB versions. SMBv1 can
be disabled by following the vendor instructions provided in Microsoft
KB2696547. Additionally, US-CERT recommends that users block SMB
directly by blocking TCP port 445 on all network boundary devices. For
SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137
/ 138 on all network boundary devices.
MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya) (uncredentialed check)
The remote Windows host is affected by the following vulnerabilities :
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit these
vulnerabilities, via a specially crafted packet, to
execute arbitrary code. (CVE-2017-0143, CVE-2017-0144,
CVE-2017-0145, CVE-2017-0146, CVE-2017-0148)
- An information disclosure vulnerability exists in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit this, via a
specially crafted packet, to disclose sensitive
information. (CVE-2017-0147)
ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY are
four of multiple Equation Group vulnerabilities and exploits disclosed
on 2017/04/14 by a group known as the Shadow Brokers. WannaCry /
WannaCrypt is a ransomware program utilizing the ETERNALBLUE exploit,
and EternalRocks is a worm that utilizes seven Equation Group
vulnerabilities. Petya is a ransomware program that first utilizes
CVE-2017-0199, a vulnerability in Microsoft Office, and then spreads
via ETERNALBLUE.
Javasolt megoldás
Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016. Microsoft has also
released emergency patches for Windows operating systems that are no
longer supported, including Windows XP, 2003, and 8.
For unsupported Windows operating systems, e.g. Windows XP, Microsoft
recommends that users discontinue the use of SMBv1. SMBv1 lacks
security features that were included in later SMB versions. SMBv1 can
be disabled by following the vendor instructions provided in Microsoft
KB2696547. Additionally, US-CERT recommends that users block SMB
directly by blocking TCP port 445 on all network boundary devices. For
SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137
/ 138 on all network boundary devices.
MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya) (uncredentialed check)
The remote Windows host is affected by the following vulnerabilities :
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit these
vulnerabilities, via a specially crafted packet, to
execute arbitrary code. (CVE-2017-0143, CVE-2017-0144,
CVE-2017-0145, CVE-2017-0146, CVE-2017-0148)
- An information disclosure vulnerability exists in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit this, via a
specially crafted packet, to disclose sensitive
information. (CVE-2017-0147)
ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY are
four of multiple Equation Group vulnerabilities and exploits disclosed
on 2017/04/14 by a group known as the Shadow Brokers. WannaCry /
WannaCrypt is a ransomware program utilizing the ETERNALBLUE exploit,
and EternalRocks is a worm that utilizes seven Equation Group
vulnerabilities. Petya is a ransomware program that first utilizes
CVE-2017-0199, a vulnerability in Microsoft Office, and then spreads
via ETERNALBLUE.
Javasolt megoldás
Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016. Microsoft has also
released emergency patches for Windows operating systems that are no
longer supported, including Windows XP, 2003, and 8.
For unsupported Windows operating systems, e.g. Windows XP, Microsoft
recommends that users discontinue the use of SMBv1. SMBv1 lacks
security features that were included in later SMB versions. SMBv1 can
be disabled by following the vendor instructions provided in Microsoft
KB2696547. Additionally, US-CERT recommends that users block SMB
directly by blocking TCP port 445 on all network boundary devices. For
SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137
/ 138 on all network boundary devices.
MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya) (uncredentialed check)
The remote Windows host is affected by the following vulnerabilities :
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit these
vulnerabilities, via a specially crafted packet, to
execute arbitrary code. (CVE-2017-0143, CVE-2017-0144,
CVE-2017-0145, CVE-2017-0146, CVE-2017-0148)
- An information disclosure vulnerability exists in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An
unauthenticated, remote attacker can exploit this, via a
specially crafted packet, to disclose sensitive
information. (CVE-2017-0147)
ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY are
four of multiple Equation Group vulnerabilities and exploits disclosed
on 2017/04/14 by a group known as the Shadow Brokers. WannaCry /
WannaCrypt is a ransomware program utilizing the ETERNALBLUE exploit,
and EternalRocks is a worm that utilizes seven Equation Group
vulnerabilities. Petya is a ransomware program that first utilizes
CVE-2017-0199, a vulnerability in Microsoft Office, and then spreads
via ETERNALBLUE.
Javasolt megoldás
Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016. Microsoft has also
released emergency patches for Windows operating systems that are no
longer supported, including Windows XP, 2003, and 8.
For unsupported Windows operating systems, e.g. Windows XP, Microsoft
recommends that users discontinue the use of SMBv1. SMBv1 lacks
security features that were included in later SMB versions. SMBv1 can
be disabled by following the vendor instructions provided in Microsoft
KB2696547. Additionally, US-CERT recommends that users block SMB
directly by blocking TCP port 445 on all network boundary devices. For
SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137
/ 138 on all network boundary devices.
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
Microsoft Windows SMBv1 Multiple Vulnerabilities
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1)
enabled. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist
in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to disclose sensitive
information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274,
CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to
stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in
Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated,
remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary
code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin
cannot always correctly determine if the Windows host is vulnerable if
the host is running a later Windows version (i.e., Windows 8.1, 10,
2012, 2012 R2, and 2016) specifically that named pipes and shares are
allowed to be accessed remotely and anonymously. Tenable does not
recommend this configuration, and the hosts should be checked locally
for patches with one of the following plugins, depending on the
Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.
Javasolt megoldás
Apply the applicable security update for your Windows version :
- Windows Server 2008 : KB4018466
- Windows 7 : KB4019264
- Windows Server 2008 R2 : KB4019264
- Windows Server 2012 : KB4019216
- Windows 8.1 / RT 8.1. : KB4019215
- Windows Server 2012 R2 : KB4019215
- Windows 10 : KB4019474
- Windows 10 Version 1511 : KB4019473
- Windows 10 Version 1607 : KB4019472
- Windows 10 Version 1703 : KB4016871
- Windows Server 2016 : KB4019472
MEDIUM (12)
Remote Desktop Protocol Server Man-in-the-Middle Weakness
The remote version of the Remote Desktop Protocol Server (Terminal
Service) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP
client makes no effort to validate the identity of the server when
setting up encryption. An attacker with the ability to intercept
traffic from the RDP server can establish encryption with the client
and server without being detected. A MiTM attack of this nature would
allow the attacker to obtain any sensitive information transmitted,
including authentication credentials.
This flaw exists because the RDP server stores a publicly known
hard-coded RSA private key. Any attacker in a privileged network
location can use the key for this attack.
Javasolt megoldás
- Force the use of SSL as a transport layer for this service if
supported, or/and
- On Microsoft Windows operating systems, select the 'Allow connections
only from computers running Remote Desktop with Network Level
Authentication' setting if it is available.
SSL Weak Cipher Suites Supported
Plugin ID: 26928
Port: tcp/1433
The remote host supports the use of SSL ciphers that offer weak
encryption.
Note: This is considerably easier to exploit if the attacker is on the
same physical network.
Javasolt megoldás
Reconfigure the affected application, if possible to avoid the use of
weak ciphers.
SSL Certificate Signed Using Weak Hashing Algorithm
The remote service uses an SSL certificate chain that has been signed
using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5,
or SHA1). These signature algorithms are known to be vulnerable to
collision attacks. An attacker can exploit this to generate another
certificate with the same digital signature, allowing an attacker to
masquerade as the affected service.
Note that this plugin reports all SSL certificate chains signed with
SHA-1 that expire after January 1, 2017 as vulnerable. This is in
accordance with Google's gradual sunsetting of the SHA-1 cryptographic
hash algorithm.
Note that certificates in the chain that are contained in the Nessus
CA database (known_CA.inc) have been ignored.
Javasolt megoldás
Contact the Certificate Authority to have the SSL certificate reissued.
SSL Certificate Signed Using Weak Hashing Algorithm
The remote service uses an SSL certificate chain that has been signed
using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5,
or SHA1). These signature algorithms are known to be vulnerable to
collision attacks. An attacker can exploit this to generate another
certificate with the same digital signature, allowing an attacker to
masquerade as the affected service.
Note that this plugin reports all SSL certificate chains signed with
SHA-1 that expire after January 1, 2017 as vulnerable. This is in
accordance with Google's gradual sunsetting of the SHA-1 cryptographic
hash algorithm.
Note that certificates in the chain that are contained in the Nessus
CA database (known_CA.inc) have been ignored.
Javasolt megoldás
Contact the Certificate Authority to have the SSL certificate reissued.
SSL Certificate with Wrong Hostname
Plugin ID: 45411
Port: tcp/1433
The 'commonName' (CN) attribute of the SSL certificate presented for
this service is for a different machine.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192
Port: tcp/1433
The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Self-Signed Certificate
Plugin ID: 57582
Port: tcp/1433
The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SMB Signing not required
Plugin ID: 57608
Port: tcp/445
Signing is not required on the remote SMB server. An unauthenticated,
remote attacker can exploit this to conduct man-in-the-middle attacks
against the SMB server.
Javasolt megoldás
Enforce message signing in the host's configuration. On Windows, this
is found in the policy setting 'Microsoft network server: Digitally
sign communications (always)'. On Samba, the setting is called 'server
signing'. See the 'see also' links for further details.
Terminal Services Encryption Level is Medium or Low
Plugin ID: 57690
Port: tcp/3389
The remote Terminal Services service is not configured to use strong
cryptography.
Using weak cryptography with this service may allow an attacker to
eavesdrop on the communications more easily and obtain screenshots
and/or keystrokes.
Javasolt megoldás
Change RDP encryption level to one of :
3. High
4. FIPS Compliant
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream
of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an
attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4
ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser
and web server support.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream
of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an
attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4
ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser
and web server support.
SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)
The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites.
Javasolt megoldás
Reconfigure the service to remove support for EXPORT_RSA cipher
suites.
LOW (3)
Terminal Services Encryption Level is not FIPS-140 Compliant
Plugin ID: 30218
Port: tcp/3389
The encryption setting used by the remote Terminal Services service
is not FIPS-140 compliant.
Javasolt megoldás
Change RDP encryption level to :
4. FIPS Compliant
SSL Certificate Chain Contains RSA Keys Less Than 2048 bits
Plugin ID: 69551
Port: tcp/1433
At least one of the X.509 certificates sent by the remote host has a
key that is shorter than 2048 bits. According to industry standards
set by the Certification Authority/Browser (CA/B) Forum, certificates
issued after January 1, 2014 must be at least 2048 bits.
Some browser SSL implementations may reject keys less than 2048 bits
after January 1, 2014. Additionally, some SSL certificate vendors may
revoke certificates less than 2048 bits before January 1, 2014.
Note that Nessus will not flag root certificates with RSA keys less
than 2048 bits if they were issued prior to December 31, 2010, as the
standard considers them exempt.
Javasolt megoldás
Replace the certificate in the chain with the RSA key less than 2048
bits in length with a longer key, and reissue any certificates signed
by the old certificate.
SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)
The remote host is affected by a man-in-the-middle (MitM) information
disclosure vulnerability known as POODLE. The vulnerability is due to
the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few
as 256 tries if they are able to force a victim application to
repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can
be 'rolled back' to SSLv3, even if TLSv1 or newer is supported by the
client and service.
The TLS Fallback SCSV mechanism prevents 'version rollback' attacks
without impacting legacy clients; however, it can only protect
connections when the client and service support the mechanism. Sites
that cannot disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any
particular SSL implementation. Disabling SSLv3 is the only way to
completely mitigate the vulnerability.
Javasolt megoldás
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV
mechanism until SSLv3 can be disabled.