Ollama alapú vezetői elemzésKIMENET:
A kockázati szint magas, a sürgősség kritikus.
A rendszer biztonsága komoly veszélyben forog.
A kockázatok kezeléséhez sürgős intézkedésekre van szükség.
ÖSSZKÉP:
A vizsgált rendszerben több kritikus biztonsági hiányt találtunk, amelyek komoly veszélyeztetést jelentenek. A kockázati szint magas, a sürgősség kritikus.
FŐ KOCKÁZATI TÉMAK:
A NFS-szerveren a biztonsági hibák miatt történhetnek adatlopások.
A SMB-szerveren a biztonsági hibák miatt történhetnek man-in-the-middle támadások.
AJÁNLOTT 0–7 NAP:
Gyorsan javítsuk ki a kritikus biztonsági hiányokat, például a NFS-szerveren és a SMB-szerveren.
Rendszeresen frissítsük a rendszerbiztonsági szoftvert.
AJÁNLOTT 7–30 NAP:
Vizsgáljuk át a rendszert, hogy megtaláljunk tovább
Kritikus (1 típus / 3 összes)- NFS Exported Share Information Disclosure
Magas (4 típus / 6 összes)- NFS Share User Mountable
- NFS Shares World Readable
- Microsoft Windows SMB Shares Unprivileged Access
- SSL Medium Strength Cipher Suites Supported (SWEET32)
Közepes (9 típus / 21 összes)- mDNS Detection (Remote Network)
- SSL Certificate Signed Using Weak Hashing Algorithm
- SSL Certificate with Wrong Hostname
- SSL Certificate Cannot Be Trusted
- SSL Self-Signed Certificate
- SMB Signing not required
- SSL RC4 Cipher Suites Supported (Bar Mitzvah)
- TLS Version 1.0 Protocol Detection
- TLS Version 1.1 Deprecated Protocol
Ollama: llama3.1:8b | ollama version is 0.14.2 | 2026-01-31 00:28
CRITICAL (3)
NFS Exported Share Information Disclosure
At least one of the NFS shares exported by the remote server could be
mounted by the scanning host. An attacker may be able to leverage
this to read (and possibly write) files on remote host.
Note: Shares protected by an ACL that includes the IP of the Nessus
host will not be tested.
Javasolt megoldás
Configure NFS on the remote host so that only authorized hosts can
mount its remote shares.
NFS Exported Share Information Disclosure
At least one of the NFS shares exported by the remote server could be
mounted by the scanning host. An attacker may be able to leverage
this to read (and possibly write) files on remote host.
Note: Shares protected by an ACL that includes the IP of the Nessus
host will not be tested.
Javasolt megoldás
Configure NFS on the remote host so that only authorized hosts can
mount its remote shares.
NFS Exported Share Information Disclosure
At least one of the NFS shares exported by the remote server could be
mounted by the scanning host. An attacker may be able to leverage
this to read (and possibly write) files on remote host.
Note: Shares protected by an ACL that includes the IP of the Nessus
host will not be tested.
Javasolt megoldás
Configure NFS on the remote host so that only authorized hosts can
mount its remote shares.
HIGH (6)
NFS Share User Mountable
Plugin ID: 15984
Port: udp/2049
Nessus was either able to mount some of the NFS shares exported by the
remote server or disclose potentially sensitive information such as a
directory listing. An attacker may exploit this issue to gain read and
possibly write access to files on remote host.
Note that root privileges were not required to mount the remote
shares since the source port to mount the shares was higher than 1024.
Javasolt megoldás
Configure NFS on the remote host so that only authorized hosts can
mount the remote shares. The remote NFS server should prevent mount
requests originating from a non-privileged port.
NFS Shares World Readable
Plugin ID: 42256
Port: tcp/2049
The remote NFS server is exporting one or more shares without
restricting access (based on hostname, IP, or IP range).
Javasolt megoldás
Place the appropriate restrictions on all NFS shares.
Microsoft Windows SMB Shares Unprivileged Access
The remote host has one or more Windows shares that can be accessed through
the network with the given credentials.
Depending on the share rights, it may allow an attacker to read/write
confidential data.
Javasolt megoldás
To restrict access under Windows, open Explorer, right click on
each share, go to the 'Sharing' tab, and click on 'Permissions'.
Microsoft Windows SMB Shares Unprivileged Access
The remote host has one or more Windows shares that can be accessed through
the network with the given credentials.
Depending on the share rights, it may allow an attacker to read/write
confidential data.
Javasolt megoldás
To restrict access under Windows, open Explorer, right click on
each share, go to the 'Sharing' tab, and click on 'Permissions'.
SSL Medium Strength Cipher Suites Supported (SWEET32)
The remote host supports the use of SSL ciphers that offer medium
strength encryption. Nessus regards medium strength as any encryption
that uses key lengths at least 64 bits and less than 112 bits, or
else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength
encryption if the attacker is on the same physical network.
Javasolt megoldás
Reconfigure the affected application if possible to avoid use of
medium strength ciphers.
SSL Medium Strength Cipher Suites Supported (SWEET32)
The remote host supports the use of SSL ciphers that offer medium
strength encryption. Nessus regards medium strength as any encryption
that uses key lengths at least 64 bits and less than 112 bits, or
else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength
encryption if the attacker is on the same physical network.
Javasolt megoldás
Reconfigure the affected application if possible to avoid use of
medium strength ciphers.
MEDIUM (21)
mDNS Detection (Remote Network)
Plugin ID: 12218
Port: udp/5353
The remote service understands the Bonjour (also known as ZeroConf or
mDNS) protocol, which allows anyone to uncover information from the
remote host such as its operating system type and exact version, its
hostname, and the list of services it is running.
This plugin attempts to discover mDNS used by hosts that are not on the
network segment on which Nessus resides.
Javasolt megoldás
Filter incoming traffic to UDP port 5353, if desired.
SSL Certificate Signed Using Weak Hashing Algorithm
The remote service uses an SSL certificate chain that has been signed
using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5,
or SHA1). These signature algorithms are known to be vulnerable to
collision attacks. An attacker can exploit this to generate another
certificate with the same digital signature, allowing an attacker to
masquerade as the affected service.
Note that this plugin reports all SSL certificate chains signed with
SHA-1 that expire after January 1, 2017 as vulnerable. This is in
accordance with Google's gradual sunsetting of the SHA-1 cryptographic
hash algorithm.
Note that certificates in the chain that are contained in the Nessus
CA database (known_CA.inc) have been ignored.
Javasolt megoldás
Contact the Certificate Authority to have the SSL certificate reissued.
SSL Certificate Signed Using Weak Hashing Algorithm
The remote service uses an SSL certificate chain that has been signed
using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5,
or SHA1). These signature algorithms are known to be vulnerable to
collision attacks. An attacker can exploit this to generate another
certificate with the same digital signature, allowing an attacker to
masquerade as the affected service.
Note that this plugin reports all SSL certificate chains signed with
SHA-1 that expire after January 1, 2017 as vulnerable. This is in
accordance with Google's gradual sunsetting of the SHA-1 cryptographic
hash algorithm.
Note that certificates in the chain that are contained in the Nessus
CA database (known_CA.inc) have been ignored.
Javasolt megoldás
Contact the Certificate Authority to have the SSL certificate reissued.
SSL Certificate with Wrong Hostname
Plugin ID: 45411
Port: tcp/21
The 'commonName' (CN) attribute of the SSL certificate presented for
this service is for a different machine.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate with Wrong Hostname
Plugin ID: 45411
Port: tcp/443
The 'commonName' (CN) attribute of the SSL certificate presented for
this service is for a different machine.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate with Wrong Hostname
Plugin ID: 45411
Port: tcp/8890
The 'commonName' (CN) attribute of the SSL certificate presented for
this service is for a different machine.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192
Port: tcp/21
The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192
Port: tcp/443
The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Certificate Cannot Be Trusted
Plugin ID: 51192
Port: tcp/8890
The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Self-Signed Certificate
Plugin ID: 57582
Port: tcp/21
The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Self-Signed Certificate
Plugin ID: 57582
Port: tcp/443
The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SSL Self-Signed Certificate
Plugin ID: 57582
Port: tcp/8890
The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.
Javasolt megoldás
Purchase or generate a proper SSL certificate for this service.
SMB Signing not required
Plugin ID: 57608
Port: tcp/445
Signing is not required on the remote SMB server. An unauthenticated,
remote attacker can exploit this to conduct man-in-the-middle attacks
against the SMB server.
Javasolt megoldás
Enforce message signing in the host's configuration. On Windows, this
is found in the policy setting 'Microsoft network server: Digitally
sign communications (always)'. On Samba, the setting is called 'server
signing'. See the 'see also' links for further details.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream
of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an
attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4
ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser
and web server support.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream
of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an
attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4
ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser
and web server support.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream
of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an
attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4
ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser
and web server support.
SSL RC4 Cipher Suites Supported (Bar Mitzvah)
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream
of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an
attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.
Javasolt megoldás
Reconfigure the affected application, if possible, to avoid use of RC4
ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser
and web server support.
TLS Version 1.0 Protocol Detection
Plugin ID: 104743
Port: tcp/21
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a
number of cryptographic design flaws. Modern implementations of TLS 1.0
mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are
designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30,
2018, except for POS POI terminals (and the SSL/TLS termination
points to which they connect) that can be verified as not being
susceptible to any known exploits.
Javasolt megoldás
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
TLS Version 1.0 Protocol Detection
Plugin ID: 104743
Port: tcp/8890
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a
number of cryptographic design flaws. Modern implementations of TLS 1.0
mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are
designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30,
2018, except for POS POI terminals (and the SSL/TLS termination
points to which they connect) that can be verified as not being
susceptible to any known exploits.
Javasolt megoldás
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
TLS Version 1.1 Deprecated Protocol
Plugin ID: 157288
Port: tcp/21
The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended
cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM
cannot be used with TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major
web browsers and major vendors.
Javasolt megoldás
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
TLS Version 1.1 Deprecated Protocol
Plugin ID: 157288
Port: tcp/8890
The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended
cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM
cannot be used with TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major
web browsers and major vendors.
Javasolt megoldás
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
LOW (2)
ICMP Timestamp Request Remote Date Disclosure
The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date that is set on the targeted machine, which
may assist an unauthenticated, remote attacker in defeating time-based
authentication protocols.
Timestamps returned from machines running Windows Vista / 7 / 2008 /
2008 R2 are deliberately incorrect, but usually within 1000 seconds of
the actual system time.
Javasolt megoldás
Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).
SSL Certificate Chain Contains RSA Keys Less Than 2048 bits
Plugin ID: 69551
Port: tcp/8890
At least one of the X.509 certificates sent by the remote host has a
key that is shorter than 2048 bits. According to industry standards
set by the Certification Authority/Browser (CA/B) Forum, certificates
issued after January 1, 2014 must be at least 2048 bits.
Some browser SSL implementations may reject keys less than 2048 bits
after January 1, 2014. Additionally, some SSL certificate vendors may
revoke certificates less than 2048 bits before January 1, 2014.
Note that Nessus will not flag root certificates with RSA keys less
than 2048 bits if they were issued prior to December 31, 2010, as the
standard considers them exempt.
Javasolt megoldás
Replace the certificate in the chain with the RSA key less than 2048
bits in length with a longer key, and reissue any certificates signed
by the old certificate.