VLAN703_EMK – 195.111.75.40

VLAN: 703CIDR: 10.98.100.0/22, 10.98.200.0/22, 195.111.75.8/30, 195.111.75.32/27, 195.111.75.64/27NAT: 193.224.49.52Nessus mappa: 1472
Scan: VLAN703_-_EMK_10.98.100.0_22__195.111.75.8_30__195.111.75.32_27__195.111.75.64_27Dátum: 2026-01-30 16:08
Ollama alapú vezetői elemzés

Összkép: A vizsgált rendszerben kockázatot jelentenek a SSL/ TLS kapcsolatok biztonsági problémái, amelyek közé tartozik az érvénytelenül lejáró SSL tanúsítvány és a gyenge titkosítású csoportok támogatása. A kockázati szint Közepes, a sürgősség Tervezheto (7-30 nap).

Fő kockázati témák: Az érvénytelenül lejáró SSL tanúsítvány és a gyenge titkosítású csoportok támogatása jelentenek főbb kockázatokat.

Ajánlott 0–7 nap: A legfontosabb, hogy azonnal megoldjuk az érvénytelenül lejáró SSL tanúsítvány problémáját, és gyenge titkosítású csoportok támogatását is el kell kerülni. Ezt a quick win / előkészítés szinten megoldhatjuk.

Ajánlott 7–30 nap: A rendszer biztonságának javítása érdekében ajánlatos rendszeres újraszkennelést és hardeninget végezni, hogy elkerüljük a j

Közepes (8 típus / 11 összes)
  1. SSL Certificate Expiry
  2. SSL Anonymous Cipher Suites Supported
  3. SSL Certificate Cannot Be Trusted
  4. SSL Self-Signed Certificate
  5. TLS Version 1.0 Protocol Detection
  6. HSTS Missing From HTTPS Server (RFC 6797)
  7. TLS Version 1.1 Deprecated Protocol
  8. SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)
Ollama: llama3.1:8b | ollama version is 0.14.2 | 2026-01-30 23:40

MEDIUM (11)

SSL Certificate Expiry
Plugin ID: 15901 Port: tcp/443
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.
Javasolt megoldás
Purchase or generate a new SSL certificate to replace the existing one.
SSL Certificate Expiry
Plugin ID: 15901 Port: tcp/3000
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.
Javasolt megoldás
Purchase or generate a new SSL certificate to replace the existing one.
SSL Anonymous Cipher Suites Supported
Plugin ID: 31705 Port: tcp/25 CVE: CVE-2007-1858
The remote host supports the use of anonymous SSL ciphers. While this enables an administrator to set up a service that encrypts traffic without having to generate and configure SSL certificates, it offers no way to verify the remote host's identity and renders the service vulnerable to a man-in-the-middle attack. Note: This is considerably easier to exploit if the attacker is on the same physical network.
Javasolt megoldás
Reconfigure the affected application if possible to avoid use of weak ciphers.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192 Port: tcp/25
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192 Port: tcp/443
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192 Port: tcp/3000
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Self-Signed Certificate
Plugin ID: 57582 Port: tcp/25
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
TLS Version 1.0 Protocol Detection
Plugin ID: 104743 Port: tcp/25
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible. As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors. PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.
Javasolt megoldás
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
HSTS Missing From HTTPS Server (RFC 6797)
Plugin ID: 142960 Port: tcp/3000
The remote web server is not enforcing HSTS, as defined by RFC 6797. HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.
Javasolt megoldás
Configure the remote web server to use HSTS.
TLS Version 1.1 Deprecated Protocol
Plugin ID: 157288 Port: tcp/25
The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.
Javasolt megoldás
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)
Plugin ID: 187315 Port: tcp/22 CVE: CVE-2023-48795
The remote SSH server is vulnerable to a man-in-the-middle prefix truncation weakness known as Terrapin. This can allow a remote, man-in-the-middle attacker to bypass integrity checks and downgrade the connection's security. Note that this plugin only checks for remote SSH servers that support either ChaCha20-Poly1305 or CBC with Encrypt-then-MAC and do not support the strict key exchange countermeasures. It does not check for vulnerable software versions.
Javasolt megoldás
Contact the vendor for an update with the strict key exchange countermeasures or disable the affected algorithms.

LOW (1)

ICMP Timestamp Request Remote Date Disclosure
Plugin ID: 10114 Port: icmp/0 CVE: CVE-1999-0524
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols. Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Javasolt megoldás
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).