Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
192.168.0.1 | 1 | 2 | 1 | Finished |
Service | Severity | Description |
isakmp (500/udp) | Port is open | |
general/udp | It was possible to crash the remote server using the linux 'zero fragment' bug. An attacker may use this flaw to prevent your network from working properly. Solution : if the remote host is a Linux server, then install a newer kernel (2.2.4). If it is not, then contact your vendor for a patch. Risk factor : High CVE : CAN-1999-0431 BID : 2247 | |
general/icmp | The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Risk factor : Low CVE : CAN-1999-0524 | |
isakmp (500/udp) | The remote host seems to be enabled to do Internet Key Exchange (IKE). This is typically indicative of a VPN server. VPN servers are used to connect remote hosts into internal resources. Solution: You should ensure that: 1) The VPN is authorized for your Companies computing environment 2) The VPN utilizes strong encryption 3) The VPN utilizes strong authentication Risk factor : Low |