HIGH (2)
Apple AirPort Base Station Authentication Credential Encryption Weakness
The remote host is an Apple Airport Wireless Access Point which
can be administrated on top of TCP port 5009.
There is a design flaw in the administrative protocol which makes
the clients which connect to this port send the password
in cleartext (although slightly obsfuscated).
An attacker who has the ability to sniff the data going to this
device may use this flaw to gain its administrative password and
gain its control. Since the airport base station does not keep any
log, it will be difficult to determine that administrative access
has been stolen.
Javasolt megoldás
Block incoming traffic to this port, and only administer
this base station when connected to it using a cross-over ethernet
cable.
SNMP Agent Default Community Name (public)
It is possible to obtain the default community name of the remote
SNMP server.
An attacker may use this information to gain more knowledge about the
remote host, or to change the configuration of the remote system (if
the default community allows such modifications).
Javasolt megoldás
Disable the SNMP service on the remote host if you do not use it.
Either filter incoming UDP packets going to this port, or change the
default community string.
MEDIUM (2)
Airport Administrative Traffic Detection (192/UDP)
Plugin ID: 20345
Port: udp/192
The remote host is an Airport, Airport Extreme or Airport Express
wireless access point. It is possible to gather information about the
remote base station (such as its connection type or connection time)
by sending packets to UDP port 192.
An attacker connected to this network may also use this protocol to
force the base station to disconnect from the network if it is using
PPPoE, thus causing a denial of service for the other users.
Javasolt megoldás
Filter incoming traffic to this port and make sure only authorized
hosts can connect to the wireless network this base station listens
on.
SNMP 'GETBULK' Reflection DDoS
The remote SNMP daemon is responding with a large amount of data to a
'GETBULK' request with a larger than normal value for
'max-repetitions'. A remote attacker can use this SNMP server to
conduct a reflected distributed denial of service attack on an
arbitrary remote host.
Javasolt megoldás
Disable the SNMP service on the remote host if you do not use it.
Otherwise, restrict and monitor access to this service, and consider
changing the default 'public' community string.
LOW (1)
ICMP Timestamp Request Remote Date Disclosure
The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date that is set on the targeted machine, which
may assist an unauthenticated, remote attacker in defeating time-based
authentication protocols.
Timestamps returned from machines running Windows Vista / 7 / 2008 /
2008 R2 are deliberately incorrect, but usually within 1000 seconds of
the actual system time.
Javasolt megoldás
Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).