Ollama alapú vezetői elemzésKIMENET
A vizsgált IP-cím (195.111.75.51) kritikus kockázati szintű, sürgős kezelést igényel a következő 7 napon belül.
ÖSSZKÉP
A vizsgálat során több sérülékenység is kimutatásra került, amelyek között van egy kritikus és két magas szintű. A legfontosabb megállapítások a következők:
Kritikus szinten az Ubuntu Linux verziója 16.04.x, amely már nem támogatott.
Magas szinten SSL gyenge kódolású csoportok támogatása (SWEET32) és SSL tanúsítvány lejárata.
FŐ KOCKÁZATI TÉMAK
A kritikus sérülékenység az, hogy a rendszeren futó Ubuntu Linux verziója 16.04.x, amely már nem támogatott. A magas szintű sérülékenységek között van az SSL gyenge kódolású csoportok támogatása (SWEET32) és a tanúsítvány lejárata.
AJÁNLOTT 0–7 N
Kritikus (1 típus / 1 összes)- Canonical Ubuntu Linux SEoL (16.04.x)
Magas (1 típus / 2 összes)- SSL Medium Strength Cipher Suites Supported (SWEET32)
Közepes (8 típus / 13 összes)- SSL Certificate Expiry
- SSL Anonymous Cipher Suites Supported
- SSL Certificate Cannot Be Trusted
- SSL Self-Signed Certificate
- SSL RC4 Cipher Suites Supported (Bar Mitzvah)
- TLS Version 1.0 Protocol Detection
- TLS Version 1.1 Deprecated Protocol
- SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)
Ollama: llama3.1:8b | ollama version is 0.14.2 | 2026-01-30 23:59
CRITICAL (1)
Canonical Ubuntu Linux SEoL (16.04.x)
Plugin ID: 201351
Port: tcp/22
According to its version, Canonical Ubuntu Linux is 16.04.x. It is, therefore, no longer maintained by its vendor or
provider.
Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it may
contain security vulnerabilities.
Javasolt megoldás
Upgrade to a version of Canonical Ubuntu Linux that is currently supported.
HIGH (2)
SSL Medium Strength Cipher Suites Supported (SWEET32)
The remote host supports the use of SSL ciphers that offer medium
strength encryption. Nessus regards medium strength as any encryption
that uses key lengths at least 64 bits and less than 112 bits, or
else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength
encryption if the attacker is on the same physical network.
Javasolt megoldás
Reconfigure the affected application if possible to avoid use of
medium strength ciphers.
SSL Medium Strength Cipher Suites Supported (SWEET32)
The remote host supports the use of SSL ciphers that offer medium
strength encryption. Nessus regards medium strength as any encryption
that uses key lengths at least 64 bits and less than 112 bits, or
else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength
encryption if the attacker is on the same physical network.
Javasolt megoldás
Reconfigure the affected application if possible to avoid use of
medium strength ciphers.
MEDIUM (13)
SSL Certificate Expiry
Plugin ID: 15901
Port: tcp/25
This plugin checks expiry dates of certificates associated with SSL-
enabled services on the target and reports whether any have already
expired.
Javasolt megoldás
Purchase or generate a new SSL certificate to replace the existing
one.
SSL Certificate Expiry
Plugin ID: 15901
Port: tcp/443
This plugin checks expiry dates of certificates associated with SSL-
enabled services on the target and reports whether any have already
expired.
Javasolt megoldás
Purchase or generate a new SSL certificate to replace the existing
one.
SSL Anonymous Cipher Suites Supported
The remote host supports the use of anonymous SSL ciphers. While this
enables an administrator to set up a service that encrypts traffic
without having to generate and configure SSL certificates, it offers
no way to verify the remote host's identity and renders the service
vulnerable to a man-in-the-middle attack.
Note: This is considerably easier to exploit if the attacker is on the
same physical network.
Javasolt megoldás
Reconfigure the affected application if possible to avoid use of weak
ciphers.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192
Port: tcp/25
The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192
Port: tcp/443
The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Self-Signed Certificate
Plugin ID: 57582
Port: tcp/25
The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream
of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an
attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4
ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser
and web server support.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream
of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an
attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4
ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser
and web server support.
TLS Version 1.0 Protocol Detection
Plugin ID: 104743
Port: tcp/25
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a
number of cryptographic design flaws. Modern implementations of TLS 1.0
mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are
designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30,
2018, except for POS POI terminals (and the SSL/TLS termination
points to which they connect) that can be verified as not being
susceptible to any known exploits.
Javasolt megoldás
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
TLS Version 1.0 Protocol Detection
Plugin ID: 104743
Port: tcp/443
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a
number of cryptographic design flaws. Modern implementations of TLS 1.0
mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are
designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30,
2018, except for POS POI terminals (and the SSL/TLS termination
points to which they connect) that can be verified as not being
susceptible to any known exploits.
Javasolt megoldás
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
TLS Version 1.1 Deprecated Protocol
Plugin ID: 157288
Port: tcp/25
The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended
cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM
cannot be used with TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major
web browsers and major vendors.
Javasolt megoldás
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
TLS Version 1.1 Deprecated Protocol
Plugin ID: 157288
Port: tcp/443
The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended
cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM
cannot be used with TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major
web browsers and major vendors.
Javasolt megoldás
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)
The remote SSH server is vulnerable to a man-in-the-middle prefix truncation weakness known as Terrapin. This can
allow a remote, man-in-the-middle attacker to bypass integrity checks and downgrade the connection's security.
Note that this plugin only checks for remote SSH servers that support either ChaCha20-Poly1305 or CBC with
Encrypt-then-MAC and do not support the strict key exchange countermeasures. It does not check for vulnerable software
versions.
Javasolt megoldás
Contact the vendor for an update with the strict key exchange countermeasures or disable the affected algorithms.
LOW (1)
ICMP Timestamp Request Remote Date Disclosure
The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date that is set on the targeted machine, which
may assist an unauthenticated, remote attacker in defeating time-based
authentication protocols.
Timestamps returned from machines running Windows Vista / 7 / 2008 /
2008 R2 are deliberately incorrect, but usually within 1000 seconds of
the actual system time.
Javasolt megoldás
Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).