Scan Apps Whitelist Non IPS
Scan Apps Whitelist Non IPS
Scan Apps Whitelist Non IPS
Report Summary
User Name: Supriadi IT
Login Name: htach_st9
Company: Hitachi Construction Machinery Co., Ltd.
User Role: Scanner
Address: East Tower 3F 650 Kandatsu-machi, Tsuchiura-shi
City: Ibaraki
Zip: 300-0013
Country: Japan
Created: 09/21/2023 at 05:01:05 PM (GMT+0900)
Launch Date: 09/21/2023 at 04:34:34 PM (GMT+0900)
Active Hosts: 1
Total Hosts: 1
Type: On demand
Status: Finished
Reference: scan/1695281674.29238
External Scanners: 139.87.112.11 (Scanner 12.15.57-1, Vulnerability Signatures 2.5.870-2)
Duration: 00:22:17
Title: pentest apps - 20230921
Asset Groups: -
IPs: 182.23.52.118
Excluded IPs: -
Options Profile: HCMセキュリティ診断用プロファイル
Summary of Vulnerabilities
by Severity
Severity Confirmed Potential Information Gathered Total
5 0 0 0 0
4 0 0 0 0
3 0 2 1 3
2 2 0 2 4
1 0 0 24 24
Total 2 2 27 31
5 Biggest Categories
Category Confirmed Potential Information Gathered Total
General remote services 2 0 9 11
TCP/IP 0 0 7 7
Information gathering 0 0 7 7
Web server 0 2 3 5
Firewall 0 0 1 1
Total 2 2 27 31
Services Detected
Detailed Results
Vulnerabilities (2)
2 SSL Certificate - Subject Common Name Does Not Match Server FQDN port 443/tcp over SSL
QID: 38170
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/12/2019
User Modified: -
THREAT:
An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote
server using the server's Certificate and extracts the Public Key in the Certificate to establish the secure connection.
A certificate whose Subject commonName or subjectAltName does not match the server FQDN offers only encryption without authentication.
Please note that a false positive reporting of this vulnerability is possible in the following case:
If the common name of the certificate uses a wildcard such as *.somedomainname.com and the reverse DNS resolution of the target IP is not configured.
In this case there is no way for Qualys to associate the wildcard common name to the IP. Adding a reverse DNS lookup entry to the target IP will
solve this problem.
IMPACT:
A man-in-the-middle attacker can exploit this vulnerability in tandem with a DNS cache poisoning attack to lure the client to another server, and
then steal all the encryption communication.
SOLUTION:
Please install a server certificate whose Subject commonName or subjectAltName matches the server FQDN.
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
2 Pre-shared Key Off-line Bruteforcing Using IKE Aggressive Mode port 500/udp
QID: 38498
Category: General remote services
Associated CVEs: CVE-2002-1623
Vendor Reference: cisco-sn-20030422-ike
Bugtraq ID: 7423, 5607
Service Modified: 05/27/2023
User Modified: -
Edited: No
PCI Vuln: Yes
THREAT:
IKE is used during Phase 1 and Phase 2 of establishing an IPSec connection. Phase 1 is where the two ISAKMP peers establish a secure,
authenticated channel with which to communicate. Every participant in IKE must possess a key which may be either pre-shared (PSK) or a public
key. There are inherent risks to configurations that use pre-shared keys which are exaggerated when Aggressive Mode is used.
IMPACT:
Using Aggressive Mode with pre-shared keys is the least secure option. In this particular scenario, it is possible for an attacker to gather all
necessary information in order to mount an off-line dictionary (brute force) attack on the pre-shared keys. For more information about this type
of attack, visit http://www.ernw.de/download/pskattack.pdf (http://www.ernw.de/download/pskattack.pdf).
SOLUTION:
IKE Aggressive mode with pre-shared keys should be avoided where possible. Otherwise a strong pre-shared key should be chosen.
EXPLOITABILITY:
nvd
Reference: CVE-2002-1623
Description: The design of the Internet Key Exchange (IKE) protocol, when using Aggressive Mode for shared secret authentication, does
not encrypt initiator or responder identities during negotiation, which may allow remote attackers to determine valid
usernames by (1) monitoring responses before the password is supplied or (2) sniffing, as originally reported for FireWall-1
SecuRemote.
Link: http://www.securityfocus.com/archive/1/290202
Reference: CVE-2002-1623
Description: The design of the Internet Key Exchange (IKE) protocol, when using Aggressive Mode for shared secret authentication, does
not encrypt initiator or responder identities during negotiation, which may allow remote attackers to determine valid
usernames by (1) monitoring responses before the password is supplied or (2) sniffing, as originally reported for FireWall-1
SecuRemote.
Link: http://www.securiteam.com/securitynews/5TP040U8AW.html
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
QID: 86476
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/28/2023
User Modified: -
Edited: No
PCI Vuln: Yes
THREAT:
The Web server stopped responding to 3 consecutive connection attempts and/or more than 3 consecutive HTTP / HTTPS requests. Consequently, the
service aborted testing for HTTP / HTTPS vulnerabilities. The vulnerabilities already detected are still posted.
For more details about this QID, please review the following Qualys KB article:
Qualys KB (https://success.qualys.com/support/s/article/000003057)
IMPACT:
The service was unable to complete testing for HTTP / HTTPS vulnerabilities since the Web server stopped responding.
SOLUTION:
Check the Web server status.
If the Web server was crashed during the scan, please restart the server, report the incident to Customer Support and stop scanning the Web server
until the issue is resolved.
If the Web server is unable to process multiple concurrent HTTP / HTTPS requests, please lower the scan harshness level and launch another scan.
If this vulnerability continues to be reported, please contact Customer Support.
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
RESULTS:
The web server did not respond for 4 consecutive HTTP requests.
After these, the service was able to connect to the web server 2 minutes later, but the web server still did not respond to a simple HTTP GET
request.
QID: 86476
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/28/2023
User Modified: -
Edited: No
PCI Vuln: Yes
THREAT:
The Web server stopped responding to 3 consecutive connection attempts and/or more than 3 consecutive HTTP / HTTPS requests. Consequently, the
service aborted testing for HTTP / HTTPS vulnerabilities. The vulnerabilities already detected are still posted.
For more details about this QID, please review the following Qualys KB article:
Qualys KB (https://success.qualys.com/support/s/article/000003057)
IMPACT:
The service was unable to complete testing for HTTP / HTTPS vulnerabilities since the Web server stopped responding.
SOLUTION:
Check the Web server status.
If the Web server was crashed during the scan, please restart the server, report the incident to Customer Support and stop scanning the Web server
until the issue is resolved.
If the Web server is unable to process multiple concurrent HTTP / HTTPS requests, please lower the scan harshness level and launch another scan.
If this vulnerability continues to be reported, please contact Customer Support.
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
The web server did not respond for 4 consecutive HTTP requests.
After these, the service was still unable to connect to the web server 2 minutes later.
QID: 42017
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/19/2023
User Modified: -
THREAT:
A remote access or remote management service was detected. If such a service is accessible to malicious users it can be used to carry different type
of attacks. Malicious users could try to brute force credentials or collect additional information on the service which could enable them in crafting
further attacks.
The Results section includes information on the remote access service that was found on the target.
Services like Telnet, Rlogin, SSH, windows remote desktop, pcAnywhere, Citrix Management Console, Remote Admin (RAdmin), VNC, OPENVPN and
ISAKMP are checked.
IMPACT:
Consequences vary by the type of attack.
SOLUTION:
Expose the remote access or remote management services only to the system administrators or intended users of the system.
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
QID: 45017
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 08/22/2023
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
Several different techniques can be used to identify the operating system (OS) running on a host. A short description of these techniques is provided
below. The specific technique used to identify the OS on this host is included in the RESULTS section of your report.
1) TCP/IP Fingerprint: The operating system of a host can be identified from a remote system using TCP/IP fingerprinting. All underlying operating
system TCP/IP stacks have subtle differences that can be seen in their responses to specially-crafted TCP packets. According to the results of this
"fingerprinting" technique, the OS version is among those listed below.
Note that if one or more of these subtle differences are modified by a firewall or a packet filtering device between the scanner and the host, the
fingerprinting technique may fail. Consequently, the version of the OS may not be detected correctly. If the host is behind a proxy-type firewall, the
version of the operating system detected may be that of the firewall instead of the host being scanned.
2) NetBIOS: Short for Network Basic Input Output System, an application programming interface (API) that augments the DOS BIOS by adding
special functions for local-area networks (LANs). Almost all LANs for PCs are based on the NetBIOS. Some LAN manufacturers have even extended
it, adding additional network capabilities. NetBIOS relies on a message format called Server Message Block (SMB).
3) PHP Info: PHP is a hypertext pre-processor, an open-source, server-side, HTML-embedded scripting language used to create dynamic Web pages.
Under some configurations it is possible to call PHP functions like phpinfo() and obtain operating system information.
4) SNMP: The Simple Network Monitoring Protocol is used to monitor hosts, routers, and the networks to which they attach. The SNMP service
maintains Management Information Base (MIB), a set of variables (database) that can be fetched by Managers. These include
"MIB_II.system.sysDescr" for the operating system.
IMPACT:
Not applicable.
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
Operating System Technique ID
Ubuntu/Linux TCP/IP Fingerprint U7254:80
QID: 82063
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/30/2007
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in
various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the
Result section below.
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the
uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
Based on TCP timestamps obtained via port 80, the host's uptime is 30 days, 2 hours, and 58 minutes.
The TCP timestamps from the host are in units of 1 milliseconds.
QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
THREAT:
The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
IP address Host name
182.23.52.118 No registered hostname
1 Firewall Detected
QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/22/2019
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 111, 135, 445, 1.
QID: 45004
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 08/16/2013
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
The information shown in the Result section was returned by the network infrastructure responsible for routing traffic from our cloud platform to
the target network (where the scanner appliance is located).
This information was returned from: 1) the WHOIS service, or 2) the infrastructure provided by the closest gateway server to our cloud platform. If
your ISP is routing traffic, your ISP's gateway server returned this information.
IMPACT:
This information can be used by malicious users to gather more information about the network infrastructure that may help in launching attacks
against it.
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
QID: 45005
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
THREAT:
The information shown in the Result section was returned by the network infrastructure responsible for routing traffic from our cloud platform to
the target network (where the scanner appliance is located).
This information was returned from: 1) the WHOIS service, or 2) the infrastructure provided by the closest gateway server to our cloud platform. If
your ISP is routing traffic, your ISP's gateway server returned this information.
IMPACT:
This information can be used by malicious users to gather more information about the network infrastructure that may aid in launching further
attacks against it.
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
1 Traceroute
QID: 45006
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/10/2003
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in
between.
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
Hops IP Round Trip Time Probe Port
1 139.87.10.32 0.43ms ICMP
QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/16/2022
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts,
which may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back
to the service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes
to perform parallel host scanning on all scanners.
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
QID: 45426
THREAT:
Scan activity per port is an estimate of the amount of internal process time the scanner engine spent scanning a particular TCP or UDP port. This
information can be useful to determine the reason for long scan times. The individual time values represent internal process time, not elapsed
time, and can be longer than the total scan time because of internal parallelism. High values are often caused by slowly responding services or
services on which requests time out.
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
Protocol Port Time
TCP 80 1:28:34
TCP 443 0:18:05
UDP 500 0:01:58
QID: 82004
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/12/2005
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
A port scanner was used to draw a map of all the UDP services on this host that can be accessed from the Internet.
Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall
but are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP
packets for most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets
for most (but not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.
IMPACT:
Unauthorized users can exploit this information to test vulnerabilities in each of the open services.
SOLUTION:
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
Port IANA Assigned Ports/Services Description Service Detected
500 isakmp isakmp isakmp
QID: 82023
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/16/2009
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the
Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the
service (Description) and the service that the scanner detected using service discovery (Service Detected).
IMPACT:
Unauthorized users can exploit this information to test vulnerabilities in each of the open services.
SOLUTION:
Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
Port IANA Assigned Ports/Services Description Service Detected OS On Redirected Port
80 www-http World Wide Web HTTP http
443 https http protocol over TLS/SSL http over ssl
QID: 82040
THREAT:
ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer
that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
ICMP Reply Type Triggered By Additional Information
Echo (type=0 code=0) Echo Request Echo Reply
Time Exceeded (type=11 code=0) (Various) Time Exceeded
QID: 82045
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/20/2004
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average
change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of
difficulty for exploitation of the TCP ISN generation scheme used by the host.
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
Average change between subsequent TCP initial sequence numbers is 160122307 with a standard deviation of 637139038. These TCP initial sequence
numbers were triggered by TCP SYN probes sent to the host at an average rate of 1/(4196 microseconds). The degree of difficulty to exploit the
TCP initial sequence number generation scheme is: hard.
1 IP ID Values Randomness
QID: 82046
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/28/2006
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes
between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT
section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many
operating systems, these changes reflect the network load of the host at the time this test was conducted.
Please note that for reliability reasons only the network traffic from open TCP ports is analyzed.
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/08/2004
User Modified: -
Edited: No
PCI Vuln: No
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
No results available
QID: 86565
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 02/23/2005
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
Version 1.1 of the HTTP protocol supports URL-Request Pipelining. This means that instead of using the "Keep-Alive" method to keep the TCP
connection alive over multiple requests, the protocol allows multiple HTTP URL requests to be made in the same TCP packet. Any Web server which
is HTTP 1.1 compliant should then process all the URLs requested in the single TCP packet and respond as usual.
The target Web server was found to support this functionality of the HTTP 1.1 protocol.
IMPACT:
Support for URL-Request Pipelining has interesting consequences. For example, as explained in this paper by Daniel Roelker
(http://www.defcon.org/images/defcon-11/dc-11-presentations/dc-11-Roelker/dc-11-roelker-paper.pdf), it can be used for evading detection by
Intrusion Detection Systems. Also, it can be used in HTTP Response-Spliting style attacks.
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
GET / HTTP/1.1
Host:182.23.52.118:80
<!DOCTYPE html>
<html style="height:100%">
<head>
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<title> 404 Not Found
</title></head>
<body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;">
<div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%;
left:50%;">
<h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1>
<h2 style="margin-top:20px;font-size: 30px;">Not Found
</h2>
<p>The resource requested could not be found on this server!</p>
</div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px
30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
1px 0 rgba(255, 255, 255, 0.3) inset;">
<br>Proudly powered by <a style="color:#fff;" href="http://www.litespeedtech.com/error-page">LiteSpeed Web Server</a><p>Please be advised that
LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></body></html>
HTTP/1.1 404 Not Found
Connection: Keep-Alive
Keep-Alive: timeout=5, max=100
cache-control: private, no-cache, no-store, must-revalidate, max-age=0
pragma: no-cache
content-type: text/html
content-length: 1238
date: Thu, 21 Sep 2023 07:42:21 GMT
server: LiteSpeed
<!DOCTYPE html>
<html style="height:100%">
<head>
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<title> 404 Not Found
</title></head>
<body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;">
<div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%;
left:50%;">
<h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1>
<h2 style="margin-top:20px;font-size: 30px;">Not Found
</h2>
<p>The resource requested could not be found on this server!</p>
</div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px
30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
1px 0 rgba(255, 255, 255, 0.3) inset;">
<br>Proudly powered by <a style="color:#fff;" href="http://www.litespeedtech.com/error-page">LiteSpeed Web Server</a><p>Please be advised that
LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></body></html>
QID: 38116
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/25/2016
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
CIPHER KEY-EXCHANGE AUTHENTICATION MAC ENCRYPTION(KEY-STRENGTH) GRADE
SSLv2 PROTOCOL IS DISABLED
SSLv3 PROTOCOL IS DISABLED
TLSv1 PROTOCOL IS DISABLED
TLSv1.1 PROTOCOL IS DISABLED
TLSv1.2 PROTOCOL IS ENABLED
TLSv1.2 COMPRESSION METHOD None
AES128-SHA RSA RSA SHA1 AES(128) MEDIUM
AES256-SHA RSA RSA SHA1 AES(256) HIGH
AES128-GCM-SHA256 RSA RSA AEAD AESGCM(128) MEDIUM
AES256-GCM-SHA384 RSA RSA AEAD AESGCM(256) HIGH
ECDHE-RSA-AES128-SHA ECDH RSA SHA1 AES(128) MEDIUM
ECDHE-RSA-AES256-SHA ECDH RSA SHA1 AES(256) HIGH
ECDHE-RSA-AES128-GCM-SHA256 ECDH RSA AEAD AESGCM(128) MEDIUM
ECDHE-RSA-AES256-GCM-SHA384 ECDH RSA AEAD AESGCM(256) HIGH
TLSv1.3 PROTOCOL IS ENABLED
TLS13-AES-128-GCM-SHA256 N/A N/A AEAD AESGCM(128) MEDIUM
TLS13-AES-256-GCM-SHA384 N/A N/A AEAD AESGCM(256) HIGH
TLS13-CHACHA20-POLY1305-SHA256 N/A N/A AEAD CHACHA20/POLY1305(256) HIGH
QID: 38291
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/20/2020
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
SSL session is a collection of security parameters that are negotiated by the SSL client and server for each SSL connection. SSL session caching is
targeted to reduce the overhead of negotiations in recurring SSL connections. SSL sessions can be reused to resume an earlier connection or to
establish multiple simultaneous connections. The client suggests an SSL session to be reused by identifying the session with a Session-ID during SSL
handshake. If the server finds it appropriate to reuse the session, then they both proceed to secure communication with already known security
parameters.
This test determines if SSL session caching is enabled on the host.
IMPACT:
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
1 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Invalid Protocol Version Tolerance port 443/tcp over SSL
QID: 38597
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/13/2021
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
SSL/TLS protocols have different version that can be supported by both the client and the server. This test attempts to send invalid protocol
versions to the target in order to find out what is the target's behavior. The results section contains a table that indicates what was the
target's response to each of our tests.
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
my version target version
0304 0303
0399 0303
0400 0303
0499 0303
1 SSL Certificate will expire within next six months port 443/tcp over SSL
THREAT:
Certificates are used for authentication purposes in different protocols such as SSL/TLS. Each certificate has a validity period outside of which
it is supposed to be considered invalid. This QID is reported to inform that a certificate will expire within next six months. The advance notice
can be helpful since obtaining a certificate can take some time.
IMPACT:
Expired certificates can cause connection disruptions or compromise the integrity and privacy of the connections being protected by the
certificates.
SOLUTION:
Contact the certificate authority that signed your certificate to arrange for a renewal.
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
Certificate #0 CN=apps.hexindo-tbk.co.id The certificate will expire within six months: Dec 27 23:59:59 2023 GMT
1 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Key Exchange Methods port 443/tcp over SSL
QID: 38704
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 02/02/2023
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
The following is a list of SSL/TLS key exchange methods supported by the server, along with their respective key sizes, strengths and ciphers.
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
CIPHER NAME GROUP KEY-SIZE FORWARD-SECRET CLASSICAL-STRENGTH QUANTUM-STRENGTH
TLSv1.2
AES256-GCM-SHA384 RSA 2048 no 110 low
AES128-GCM-SHA256 RSA 2048 no 110 low
AES256-SHA RSA 2048 no 110 low
AES128-SHA RSA 2048 no 110 low
ECDHE-RSA-AES256-GCM-SHA384 ECDHE x25519 256 yes 128 low
ECDHE-RSA-AES256-GCM-SHA384 ECDHE secp256r1 256 yes 128 low
ECDHE-RSA-AES256-GCM-SHA384 ECDHE secp384r1 384 yes 192 low
ECDHE-RSA-AES128-GCM-SHA256 ECDHE x25519 256 yes 128 low
ECDHE-RSA-AES128-GCM-SHA256 ECDHE secp256r1 256 yes 128 low
ECDHE-RSA-AES128-GCM-SHA256 ECDHE secp384r1 384 yes 192 low
ECDHE-RSA-AES256-SHA ECDHE x25519 256 yes 128 low
ECDHE-RSA-AES256-SHA ECDHE secp256r1 256 yes 128 low
ECDHE-RSA-AES256-SHA ECDHE secp384r1 384 yes 192 low
ECDHE-RSA-AES128-SHA ECDHE x25519 256 yes 128 low
ECDHE-RSA-AES128-SHA ECDHE secp256r1 256 yes 128 low
ECDHE-RSA-AES128-SHA ECDHE secp384r1 384 yes 192 low
TLSv1.3
TLS13-AES-128-GCM-SHA256 ECDHE x25519 256 yes 128 low
TLS13-AES-128-GCM-SHA256 ECDHE secp256r1 256 yes 128 low
TLS13-AES-128-GCM-SHA256 ECDHE secp384r1 384 yes 192 low
TLS13-AES-256-GCM-SHA384 ECDHE x25519 256 yes 128 low
TLS13-AES-256-GCM-SHA384 ECDHE secp256r1 256 yes 128 low
TLS13-AES-256-GCM-SHA384 ECDHE secp384r1 384 yes 192 low
TLS13-CHACHA20-POLY1305-SHA256 ECDHE x25519 256 yes 128 low
TLS13-CHACHA20-POLY1305-SHA256 ECDHE secp256r1 256 yes 128 low
TLS13-CHACHA20-POLY1305-SHA256 ECDHE secp384r1 384 yes 192 low
1 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Protocol Properties port 443/tcp over SSL
QID: 38706
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/09/2021
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
The following is a list of detected SSL/TLS protocol properties.
IMPACT:
Items include:
Extended Master Secret: indicates whether the extended_master_secret extension is supported or required by the server. This extension enhances
security and is recommended. Applicable to TLSv1, TLSv1.1, TLSv1.2, DTLSv1, DTLSv1.2
Encrypt Then MAC: indicates whether the encrypt_then_mac extension is supported or required by the server. This extension enhances the security
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
NAME STATUS
TLSv1.2
Extended Master Secret yes
Encrypt Then MAC no
Heartbeat no
Truncated HMAC no
Cipher priority controlled by server
OCSP stapling no
SCT extension no
TLSv1.3
Heartbeat no
Cipher priority controlled by client
OCSP stapling no
SCT extension no
1 Secure Sockets Layer (SSL) Certificate Transparency Information port 443/tcp over SSL
QID: 38718
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/09/2021
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
SSL Certificate Transparency is an industry effort to improve visibility into the process of how certificate authorities issue certificates. It is
designed to allow the owners of domain names to find all certificates that have been issued for their domains, and which certificate authorities have
issued them. This is done by requiring certificate authorities to publish all issued certificates in public logs. TLS servers can then provide
cryptographic evidence to TLS clients that the server certificate has been registered in public logs, thus providing some degree of confidence that the
certificate is legitimate. Such cryptographic evidence is referred to as an "SCT Log Proof".
The information below lists all validated SCT Log Proofs for server certificates along with information about the public log, where available.
IMPACT:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
Source Validated Name URL ID Time
Certificate #0 CN=apps.hexindo-tb
k.co.id
Certificate no (unknown) (unknown) e83ed0da3ef5063532e75728bc896bc903d3c Thu 01 Jan 1970
bd1116beceb69e1777d6d06bd6e 12:00:00 AM GMT
Certificate no (unknown) (unknown) b3737707e18450f86386d605a9dc11094a792 Thu 01 Jan 1970
db1670c0b87dcf0030e7936a59a 12:00:00 AM GMT
Certificate no (unknown) (unknown) b73efb24df9c4dba75f239c5ba58f46c5dfc4 Thu 01 Jan 1970
2cf7a9f35c49e1d098125edb499 12:00:00 AM GMT
1 TLS Secure Renegotiation Extension Support Information port 443/tcp over SSL
QID: 42350
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/22/2016
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS
connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the
client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as
the subsequent client data. TLS protocol was extended to cryptographically tierenegotiations to the TLS connections they are being performed
over. This is referred to as TLS secure renegotiation extension. This detection determines whether the TLS secure renegotiation extension is
supported by the server or not.
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
QID: 86002
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/08/2020
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
SSL certificate information is provided in the Results section.
IMPACT:
N/A
SOLUTION:
N/A
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
NAME VALUE
(0)CERTIFICATE 0
(0)Version 3 (0x2)
(0)Serial Number 0c:e8:99:8b:b4:81:7c:1d:12:25:19:c6:38:c4:dd:53
(0)Signature Algorithm sha256WithRSAEncryption
(0)ISSUER NAME
countryName US
organizationName "DigiCert, Inc."
commonName GeoTrust Global TLS RSA4096 SHA256 2022 CA1
(0)SUBJECT NAME
commonName apps.hexindo-tbk.co.id
(0)Valid From Dec 27 00:00:00 2022 GMT
(0)Valid Till Dec 27 23:59:59 2023 GMT
(0)Public Key Algorithm rsaEncryption
(0)RSA Public Key (2048 bit)
(0) RSA Public-Key: (2048 bit)
(0) Modulus:
(0) 00:c8:75:34:3a:d5:57:55:c2:00:12:db:02:f8:81:
(0) 97:c0:4a:28:fd:1f:a8:52:ab:04:12:c9:99:36:fe:
(0) 09:1e:b0:3a:4a:14:9f:7c:23:13:19:a5:89:66:fe:
(0) ab:ad:54:96:6e:6d:28:5a:1c:86:2e:12:b9:a1:5f:
(0) 32:de:d1:37:0f:e6:94:5d:f8:64:b8:3f:ff:60:02:
(0) 1c:f2:2b:fa:73:5d:d2:01:7d:99:ab:7a:ef:be:e7:
(0) 39:2f:0a:33:db:85:19:b8:fc:f9:fe:26:9b:09:00:
(0) 6f:11:22:c6:49:f0:6e:ea:c7:28:c0:a9:4b:bc:0b:
(0) 9a:84:fc:15:b2:e7:e1:4d:3e:be:77:8c:35:77:4a:
(0) f8:af:af:02:6a:a8:4e:5c:60:4f:5b:e0:5c:73:05:
1 Web Server Supports HTTP Request Pipelining port 443/tcp over SSL
QID: 86565
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 02/23/2005
User Modified: -
Edited: No
PCI Vuln: No
THREAT:
Version 1.1 of the HTTP protocol supports URL-Request Pipelining. This means that instead of using the "Keep-Alive" method to keep the TCP
connection alive over multiple requests, the protocol allows multiple HTTP URL requests to be made in the same TCP packet. Any Web server which
is HTTP 1.1 compliant should then process all the URLs requested in the single TCP packet and respond as usual.
The target Web server was found to support this functionality of the HTTP 1.1 protocol.
IMPACT:
Support for URL-Request Pipelining has interesting consequences. For example, as explained in this paper by Daniel Roelker
(http://www.defcon.org/images/defcon-11/dc-11-presentations/dc-11-Roelker/dc-11-roelker-paper.pdf), it can be used for evading detection by
Intrusion Detection Systems. Also, it can be used in HTTP Response-Spliting style attacks.
SOLUTION:
N/A
COMPLIANCE:
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
GET / HTTP/1.1
Host:182.23.52.118:443
<!DOCTYPE html>
<html style="height:100%">
<head>
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<title> 404 Not Found
</title></head>
<body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;">
<div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%;
left:50%;">
<h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1>
<h2 style="margin-top:20px;font-size: 30px;">Not Found
</h2>
<p>The resource requested could not be found on this server!</p>
</div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px
30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
1px 0 rgba(255, 255, 255, 0.3) inset;">
<br>Proudly powered by <a style="color:#fff;" href="http://www.litespeedtech.com/error-page">LiteSpeed Web Server</a><p>Please be advised that
LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></body></html>
HTTP/1.1 404 Not Found
Connection: Keep-Alive
Keep-Alive: timeout=5, max=100
cache-control: private, no-cache, no-store, must-revalidate, max-age=0
pragma: no-cache
content-type: text/html
content-length: 1238
date: Thu, 21 Sep 2023 07:42:35 GMT
server: LiteSpeed
<!DOCTYPE html>
<html style="height:100%">
<head>
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<title> 404 Not Found
</title></head>
<body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;">
<div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%;
left:50%;">
<h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1>
<h2 style="margin-top:20px;font-size: 30px;">Not Found
</h2>
<p>The resource requested could not be found on this server!</p>
</div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px
30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
1px 0 rgba(255, 255, 255, 0.3) inset;">
<br>Proudly powered by <a style="color:#fff;" href="http://www.litespeedtech.com/error-page">LiteSpeed Web Server</a><p>Please be advised that
LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></body></html>
Options Profile
HCMセキュリティ診断用プロファイル
Scan Settings
Ports:
Scanned TCP Ports: Standard Scan
Scanned UDP Ports: Standard Scan
Scan Dead Hosts: On
Close Vulnerabilities on Dead Hosts Count: Off
Purge old host data when OS changes: Off
Load Balancer Detection: Off
Perform 3-way Handshake: Off
Vulnerability Detection: Complete
Intrusive Checks: Excluded
Password Brute Forcing:
System: Standard
Custom: Disabled
Authentication:
Windows: Disabled
Unix/Cisco/Network SSH: Disabled
Unix Least Privilege Authentication: Disabled
Oracle: Disabled
Oracle Listener: Disabled
SNMP: Disabled
VMware: Disabled
DB2: Disabled
HTTP: Disabled
MySQL: Disabled
Tomcat Server: Disabled
MongoDB: Disabled
Palo Alto Networks Firewall: Disabled
Jboss Server: Disabled
Oracle WebLogic Server: Disabled
MariaDB: Disabled
InformixDB: Disabled
MS Exchange Server: Disabled
Oracle HTTP Server: Disabled
MS SharePoint: Disabled
Sybase: Disabled
Kubernetes: Disabled
SAP IQ: Disabled
SAP HANA: Disabled
Advanced Settings
Host Discovery: TCP Standard Scan, UDP Standard Scan, ICMP On
Ignore firewall-generated TCP RST packets: Off
Ignore all TCP RST packets: Off
Ignore firewall-generated TCP SYN-ACK packets: Off
Do not send TCP ACK or SYN-ACK packets during host discovery: Off
Report Legend
Vulnerability Levels
A Vulnerability is a design flaw or mis-configuration which makes your network (or a host on your network) susceptible to malicious attacks from local or
remote users. Vulnerabilities can exist in several areas of your network, such as in your firewalls, FTP servers, Web servers, operating systems or CGI
bins. Depending on the level of the security risk, the successful exploitation of a vulnerability can vary from the disclosure of information about the host
to a complete compromise of the host.
1 Minimal Intruders can collect information about the host (open ports, services, etc.) and may be
able to use this information to find other vulnerabilities.
2 Medium Intruders may be able to collect sensitive information from the host, such as the
precise version of software installed. With this information, intruders can easily
exploit known vulnerabilities specific to software versions.
3 Serious Intruders may be able to gain access to specific information stored on the host,
including security settings. This could result in potential misuse of the host by
intruders. For example, vulnerabilities at this level may include partial disclosure of
file contents, access to certain files on the host, directory browsing, disclosure of
filtering rules and security mechanisms, denial of service attacks, and unauthorized use
of services, such as mail-relaying.
4 Critical Intruders can possibly gain control of the host, or there may be potential leakage of
highly sensitive information. For example, vulnerabilities at this level may include
full read access to files, potential backdoors, or a listing of all the users on the
host.
5 Urgent Intruders can easily gain control of the host, which can lead to the compromise of your
entire network security. For example, vulnerabilities at this level may include full
read and write access to files, remote execution of commands, and the presence of
backdoors.
A potential vulnerability is one which we cannot confirm exists. The only way to verify the existence of such vulnerabilities on your network would be to
perform an intrusive scan, which could result in a denial of service. This is strictly against our policy. Instead, we urge you to investigate these potential
vulnerabilities further.
1 Minimal If this vulnerability exists on your system, intruders can collect information about the
host (open ports, services, etc.) and may be able to use this information to find other
vulnerabilities.
2 Medium If this vulnerability exists on your system, intruders may be able to collect sensitive
information from the host, such as the precise version of software installed. With this
information, intruders can easily exploit known vulnerabilities specific to software
versions.
3 Serious If this vulnerability exists on your system, intruders may be able to gain access to
specific information stored on the host, including security settings. This could result
in potential misuse of the host by intruders. For example, vulnerabilities at this level
may include partial disclosure of file contents, access to certain files on the host,
directory browsing, disclosure of filtering rules and security mechanisms, denial of
service attacks, and unauthorized use of services, such as mail-relaying.
4 Critical If this vulnerability exists on your system, intruders can possibly gain control of the
host, or there may be potential leakage of highly sensitive information. For example,
vulnerabilities at this level may include full read access to files, potential
backdoors, or a listing of all the users on the host.
5 Urgent If this vulnerability exists on your system, intruders can easily gain control of the
host, which can lead to the compromise of your entire network security. For example,
vulnerabilities at this level may include full read and write access to files, remote
execution of commands, and the presence of backdoors.
Information Gathered
Information Gathered includes visible information about the network related to the host, such as traceroute information, Internet Service Provider (ISP), or
a list of reachable hosts. Information Gathered severity levels also include Network Mapping data, such as detected firewalls, SMTP banners, or a list of
open TCP services.
1 Minimal Intruders may be able to retrieve sensitive information related to the host, such as
open UDP and TCP services lists, and detection of firewalls.
2 Medium Intruders may be able to determine the operating system running on the host, and view banner versions.
3 Serious Intruders may be able to detect highly sensitive data, such as global system user lists.