VLAN430_BTIG – 10.53.103.101

VLAN: 430CIDR: 10.53.100.0/22, 193.224.48.224/28NAT: N/ANessus mappa: 1472
Scan: VLAN430_-_BTIG_10.53.100.0_22__193.224.48.224_28Dátum: 2026-01-30 16:08
Ollama alapú vezetői elemzés

Összkép: A vizsgált rendszerben két közepes súlyú és három alacsony súlyú biztonsági kockázatot azonosítottunk. A legfontosabb problémák a nem megbízható SSL tanúsítványok és a SSH szerver konfigurációjának gyenge pontjai.

Fő kockázati témák: A rendszerben a közepes súlyú biztonsági kockázatok közé tartozik az, hogy a SSL tanúsítvány nem megbízható („SSL Certificate Cannot Be Trusted”) és egy öngyűjtött tanúsítvány használata („SSL Self-Signed Certificate"). Emellett három alacsony súlyú kockázatot is azonosítottunk, amelyek közül a legfontosabbak a SSH szerver konfigurációjának gyenge pontjai.

Ajánlott 0–7 nap: A nem megbízható SSL tanúsítványok és a SSH szerver konfigurációjának gyenge pontjainak megoldása fontos lépés az adatvédelem javításában. Ezt a feladatot quick win / előkészítésként kell kezelni, mivel nincs krit

Közepes (2 típus / 3 összes)
  1. SSL Certificate Cannot Be Trusted
  2. SSL Self-Signed Certificate
Ollama: llama3.1:8b | ollama version is 0.14.2 | 2026-01-30 22:57

MEDIUM (3)

SSL Certificate Cannot Be Trusted
Plugin ID: 51192 Port: tcp/3000
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192 Port: tcp/9090
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Self-Signed Certificate
Plugin ID: 57582 Port: tcp/3000
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.

LOW (3)

ICMP Timestamp Request Remote Date Disclosure
Plugin ID: 10114 Port: icmp/0 CVE: CVE-1999-0524
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols. Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Javasolt megoldás
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
SSH Server CBC Mode Ciphers Enabled
Plugin ID: 70658 Port: tcp/3003 CVE: CVE-2008-5161
The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext. Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions.
Javasolt megoldás
Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
SSH Weak Key Exchange Algorithms Enabled
Plugin ID: 153953 Port: tcp/3003
The remote SSH server is configured to allow key exchange algorithms which are considered weak. This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) RFC9142. Section 4 lists guidance on key exchange algorithms that SHOULD NOT and MUST NOT be enabled. This includes: diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 gss-gex-sha1-* gss-group1-sha1-* gss-group14-sha1-* rsa1024-sha1 Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions.
Javasolt megoldás
Contact the vendor or consult product documentation to disable the weak algorithms.