VLAN703_EMK – 195.111.75.45

VLAN: 703CIDR: 10.98.100.0/22, 10.98.200.0/22, 195.111.75.8/30, 195.111.75.32/27, 195.111.75.64/27NAT: 193.224.49.52Nessus mappa: 1472
Scan: VLAN703_-_EMK_10.98.100.0_22__195.111.75.8_30__195.111.75.32_27__195.111.75.64_27Dátum: 2026-02-02 08:22

CRITICAL (1)

Canonical Ubuntu Linux SEoL (18.04.x)
Plugin ID: 201456 Port: tcp/22
According to its version, Canonical Ubuntu Linux is 18.04.x. It is, therefore, no longer maintained by its vendor or provider. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it may contain security vulnerabilities.
Javasolt megoldás
Upgrade to a version of Canonical Ubuntu Linux that is currently supported.

MEDIUM (4)

TLS Version 1.0 Protocol Detection
Plugin ID: 104743 Port: tcp/443
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible. As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors. PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.
Javasolt megoldás
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
HSTS Missing From HTTPS Server (RFC 6797)
Plugin ID: 142960 Port: tcp/443
The remote web server is not enforcing HSTS, as defined by RFC 6797. HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.
Javasolt megoldás
Configure the remote web server to use HSTS.
TLS Version 1.1 Deprecated Protocol
Plugin ID: 157288 Port: tcp/443
The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.
Javasolt megoldás
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)
Plugin ID: 187315 Port: tcp/22 CVE: CVE-2023-48795
The remote SSH server is vulnerable to a man-in-the-middle prefix truncation weakness known as Terrapin. This can allow a remote, man-in-the-middle attacker to bypass integrity checks and downgrade the connection's security. Note that this plugin only checks for remote SSH servers that support either ChaCha20-Poly1305 or CBC with Encrypt-then-MAC and do not support the strict key exchange countermeasures. It does not check for vulnerable software versions.
Javasolt megoldás
Contact the vendor for an update with the strict key exchange countermeasures or disable the affected algorithms.