scan report april 7 2020 summary this document reports on the results
Search for question
Question
Scan Report
April 7, 2020
Summary
This document reports on the results of an automatic security scan. All dates are dis-
played using the timezone "Coordinated Universal Time", which is abbreviated "UTC". The
task was "Immediate scan of IP 192.168.1.10". The scan started at Tue Apr 7 01:38:24 2020
UTC and ended at Tue Apr 7 01:41:26 2020 UTC. The report first summarises the results
found. Then, for each host, the report describes every issue found. Please consider the
advice given in each description, in order to rectify the issue.
Contents
1 Result Overview
2 Results per Host
192.168.1.10 .
2.1
2.1.1
High 445/tcp
2.1.2 High general/tcp
2.1.3
2.1.4
Medium 135/tcp
Low general/tcp
1
211
22 23
4
7 2 RESULTS PER HOST
1 Result Overview
Host
High
Medium
Low
Log
False Positive
192.168.1.10
2
1
1
0
0
Total: 1
2
1
1
0
0
2
Vendor security updates are not trusted.
Overrides are on. When a result has an override, this report uses the threat of the override.
Information on overrides is included in the report.
Notes are included in the report.
This report might not show details of all issues that were found.
It only lists hosts that produced issues.
Issues with the threat level "Log" are not shown.
Issues with the threat level "Debug" are not shown.
Issues with the threat level "False Positive" are not shown.
Only results with a minimum QoD of 70 are shown.
This report contains all 4 results selected by the filtering described above. Before filtering there
were 15 results.
2 Results per Host
2.1
192.168.1.10
Host scan start
Host scan end
Tue Apr 7 01:38:44 2020 UTC
Tue Apr 7 01:41:26 2020 UTC
Service (Port)
Threat Level
445/tcp
High
general/tcp
135/tcp
general/tcp
High
Medium
Low
2.1.1 High 445/tcp
High (CVSS: 9.3)
NVT: Microsoft Windows SMB Server Multiple Vulnerabilities-Remote (4013389)
Summary
This host is missing a critical security update according to Microsoft Bulletin MS17-010.
Vulnerability Detection Result
Vulnerability was detected according to the Vulnerability Detection Method.
continues on next page.
... 2
RESULTS PER HOST
3
Impact
... continued from previous page.
Successful exploitation will allow remote attackers to gain the ability to execute code on the
target server,
also could lead to information disclosure from the server.
Solution
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Affected Software/OS
Microsoft Windows 10 x32/x64 Edition Microsoft Windows Server 2012 Edition Microsoft Win-
dows Server 2016 Microsoft Windows 8.1 x32/x64 Edition Microsoft Windows Server 2012 R2
Edition Microsoft Windows 7 x32/x64 Edition Service Pack 1 Microsoft Windows Vista x32/x64
Edition Service Pack 2 Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 Microsoft
Windows Server 2008 x32/x64 Edition Service Pack 2
Vulnerability Insight
Multiple flaws exist due to the way that the Microsoft Server Message Block 1.0 (SMBv1) server
handles certain requests.
Vulnerability Detection Method
Send the crafted SMB transaction request with fid
vulnerability.
=
O and check the response to confirm the
Details: Microsoft Windows SMB Server Multiple Vulnerabilities-Remote (4013389)
OID:1.3.6.1.4.1.25623.1.0.810676
Version used: 2019-05-03T10:54:50+0000
References
CVE: CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147,
CVE-2017-0148
BID: 96703, 96704, 96705, 96707, 96709, 96706
Other:
URL: https://support.microsoft.com/en-in/kb/4013078
URL: https://technet.microsoft.com/library/security/MS17-010
URL: https://github.com/rapid7/metasploit-framework/pull/8167/files
[return to 192.168.1.10]
2.1.2 High general/tcp
High (CVSS: 10.0)
NVT: OS End Of Life Detection
Product detection result
cpe:/o: microsoft:windows_10:1507: cb: enterprise
Detected by OS Detection Consolidation and Reporting (OID: 1.3.6.1.4.1.25623.1.0
... continues on next page... 2 RESULTS PER HOST
→.105937)
4
... continued from previous page ...
Summary
OS End Of Life Detection
The Operating System on the remote host has reached the end of life and should not be used
anymore.
Vulnerability Detection Result
The "Windows 10" Operating System on the remote host has reached the end of life
→.
CPE:
Installed version,
build or SP:
EOL date:
EOL info:
>>cle-fact-sheet
Solution
cpe:/o: microsoft:windows_10:1507: cb: enterprise
1507cb
2017-05-09
https://support.microsoft.com/en-US/help/13853/windows-lifecy
Solution type: Mitigation
Vulnerability Detection Method
Details: OS End Of Life Detection
OID:1.3.6.1.4.1.25623.1.0.103674
Version used: $Revision: 8927 $
Product Detection Result
Product: cpe:/o:microsoft:windows_10:1507: cb: enterprise
Method: OS Detection Consolidation and Reporting
OID: 1.3.6.1.4.1.25623.1.0.105937)
[return to 192.168.1.10]
2.1.3 Medium 135/tcp
Medium (CVSS: 5.0)
NVT: DCE/RPC and MSRPC Services Enumeration Reporting
Summary
Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC ser-
vices running on the remote host can be enumerated by connecting on port 135 and doing the
appropriate queries.
Vulnerability Detection Result
Here is the list of DCE/RPC or MSRPC services running on this host via the TCP p
rotocol:
... continues on next page ... 2 RESULTS PER HOST
5
Port: 49408/tcp
... continued from previous page ...
UUID: d95afe 70-a6d5-4259-822e-2c84da1ddb0d, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49408]
Port: 49409/tcp
UUID: 06bba54a-be05-49f9-b0a0-30f790261023, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49409]
Annotation: Security Center
UUID: 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49409]
Annotation: DHCP Client LRPC Endpoint
UUID: 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49409]
Annotation: DHCPv6 Client LRPC Endpoint
UUID: abfb6ca3-0c5e-4734-9285-0aee72fe8d1c, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49409]
UUID: b3781086-6a54-489b-91c8-51d067172ab7, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49409]
UUID: b37f900a-eae4-4304-a2ab-12bb668c0188, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49409]
UUID: e7f76134-9ef5-4949-a2d6-3368 cc0988f3, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49409]
UUID: f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49409]
Annotation: Event log TCPIP
Port: 49410/tcp
UUID: 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49410]
Annotation: User MgrCli
UUID: 1a0d010f-1c33-432c-b0f5-8cf4e8053099, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49410]
Annotation: IdSegSrv service
UUID: 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49410]
Annotation: Proxy Manager provider server endpoint
UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49410]
UUID: 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49410]
Annotation: IP Transition Configuration endpoint
UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49410]
UUID: 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49410]
Annotation: XactSrv service
UUID: b18fbab6-56f8-4702-84e0-41053293a869, version 1
Endpoint: ncacn_ip_tcp: 192.168.1.10 [49410]
Annotation: UserMgrCli
continues on next page
...