VLAN703_EMK – 195.111.75.32

VLAN: 703CIDR: 10.98.100.0/22, 10.98.200.0/22, 195.111.75.8/30, 195.111.75.32/27, 195.111.75.64/27NAT: 193.224.49.52Nessus mappa: 1472
Scan: VLAN703_-_EMK_10.98.100.0_22__195.111.75.8_30__195.111.75.32_27__195.111.75.64_27Dátum: 2026-02-02 08:22

HIGH (6)

MTA Open Mail Relaying Allowed
Plugin ID: 10262 Port: tcp/25 CVE: CVE-1999-0512
Nessus has detected that the remote SMTP server allows mail relaying. This issue allows any spammer to use your mail server to send their mail to the world, thus flooding your network bandwidth and possibly getting your mail server blacklisted.
Javasolt megoldás
Reconfigure your SMTP server so that it cannot be used as an indiscriminate SMTP relay. Make sure that the server uses appropriate access controls to limit the extent to which relaying is possible.
MTA Open Mail Relaying Allowed
Plugin ID: 10262 Port: tcp/25 CVE: CVE-2002-1278
Nessus has detected that the remote SMTP server allows mail relaying. This issue allows any spammer to use your mail server to send their mail to the world, thus flooding your network bandwidth and possibly getting your mail server blacklisted.
Javasolt megoldás
Reconfigure your SMTP server so that it cannot be used as an indiscriminate SMTP relay. Make sure that the server uses appropriate access controls to limit the extent to which relaying is possible.
MTA Open Mail Relaying Allowed
Plugin ID: 10262 Port: tcp/25 CVE: CVE-2003-0285
Nessus has detected that the remote SMTP server allows mail relaying. This issue allows any spammer to use your mail server to send their mail to the world, thus flooding your network bandwidth and possibly getting your mail server blacklisted.
Javasolt megoldás
Reconfigure your SMTP server so that it cannot be used as an indiscriminate SMTP relay. Make sure that the server uses appropriate access controls to limit the extent to which relaying is possible.
MTA Open Mail Relaying Allowed
Plugin ID: 10262 Port: tcp/465 CVE: CVE-1999-0512
Nessus has detected that the remote SMTP server allows mail relaying. This issue allows any spammer to use your mail server to send their mail to the world, thus flooding your network bandwidth and possibly getting your mail server blacklisted.
Javasolt megoldás
Reconfigure your SMTP server so that it cannot be used as an indiscriminate SMTP relay. Make sure that the server uses appropriate access controls to limit the extent to which relaying is possible.
MTA Open Mail Relaying Allowed
Plugin ID: 10262 Port: tcp/465 CVE: CVE-2002-1278
Nessus has detected that the remote SMTP server allows mail relaying. This issue allows any spammer to use your mail server to send their mail to the world, thus flooding your network bandwidth and possibly getting your mail server blacklisted.
Javasolt megoldás
Reconfigure your SMTP server so that it cannot be used as an indiscriminate SMTP relay. Make sure that the server uses appropriate access controls to limit the extent to which relaying is possible.
MTA Open Mail Relaying Allowed
Plugin ID: 10262 Port: tcp/465 CVE: CVE-2003-0285
Nessus has detected that the remote SMTP server allows mail relaying. This issue allows any spammer to use your mail server to send their mail to the world, thus flooding your network bandwidth and possibly getting your mail server blacklisted.
Javasolt megoldás
Reconfigure your SMTP server so that it cannot be used as an indiscriminate SMTP relay. Make sure that the server uses appropriate access controls to limit the extent to which relaying is possible.

MEDIUM (4)

HTTP TRACE / TRACK Methods Allowed
Plugin ID: 11213 Port: tcp/443 CVE: CVE-2003-1567
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are used to debug web server connections.
Javasolt megoldás
Disable these HTTP methods. Refer to the plugin output for more information.
HTTP TRACE / TRACK Methods Allowed
Plugin ID: 11213 Port: tcp/443 CVE: CVE-2004-2320
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are used to debug web server connections.
Javasolt megoldás
Disable these HTTP methods. Refer to the plugin output for more information.
HTTP TRACE / TRACK Methods Allowed
Plugin ID: 11213 Port: tcp/443 CVE: CVE-2010-0386
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are used to debug web server connections.
Javasolt megoldás
Disable these HTTP methods. Refer to the plugin output for more information.
SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)
Plugin ID: 187315 Port: tcp/22 CVE: CVE-2023-48795
The remote SSH server is vulnerable to a man-in-the-middle prefix truncation weakness known as Terrapin. This can allow a remote, man-in-the-middle attacker to bypass integrity checks and downgrade the connection's security. Note that this plugin only checks for remote SSH servers that support either ChaCha20-Poly1305 or CBC with Encrypt-then-MAC and do not support the strict key exchange countermeasures. It does not check for vulnerable software versions.
Javasolt megoldás
Contact the vendor for an update with the strict key exchange countermeasures or disable the affected algorithms.

LOW (3)

ICMP Timestamp Request Remote Date Disclosure
Plugin ID: 10114 Port: icmp/0 CVE: CVE-1999-0524
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols. Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Javasolt megoldás
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
SSH Server CBC Mode Ciphers Enabled
Plugin ID: 70658 Port: tcp/22 CVE: CVE-2008-5161
The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext. Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions.
Javasolt megoldás
Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
SSH Weak Key Exchange Algorithms Enabled
Plugin ID: 153953 Port: tcp/22
The remote SSH server is configured to allow key exchange algorithms which are considered weak. This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) RFC9142. Section 4 lists guidance on key exchange algorithms that SHOULD NOT and MUST NOT be enabled. This includes: diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 gss-gex-sha1-* gss-group1-sha1-* gss-group14-sha1-* rsa1024-sha1 Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions.
Javasolt megoldás
Contact the vendor or consult product documentation to disable the weak algorithms.