Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
10.0.0.65 | 0 | 1 | 3 | Finished |
Service | Severity | Description |
www (80/tcp) | Port is open | |
tftp (69/udp) | Port is open | |
telnet (23/tcp) | Port is open | |
telnet (23/tcp) | Synopsis : A telnet server is listening on the remote port Description : The remote host is running a telnet server. Using telnet is not recommended as logins, passwords and commands are transferred in clear text. An attacker may eavesdrop on a telnet session and obtain the credentials of other users. Solution : Disable this service and use SSH instead Risk factor : Medium / CVSS Base Score : 4 (AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C) Plugin output: Remote telnet banner: BCM96338 ADSL Router Login: | |
tftp (69/udp) | Synopsis : A TFTPD server is listening on the remote port. Description : The remote host is running a TFTPD (Trivial File Transfer Protocol). TFTPD is often used by routers and diskless hosts to retrieve their configuration. It is also used by worms to propagage. Solution : If you do not use this service, you should disable it. Risk factor : None CVE : CVE-1999-0616 | |
www (80/tcp) | An HTTP proxy is running on this port | |
www (80/tcp) | A web server is running on this port | |
telnet (23/tcp) | A telnet server seems to be running on this port |