Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

D 4 8 2 - Secure Network Design Company B Vulnerability Report Company B performed this vulnerability assessment in anticipation of system integration with Company

D482- Secure Network Design Company B Vulnerability Report Company B performed this vulnerability assessment in anticipation of system integration with Company A. This assessment was performed by a qualified third-party assessor, and this report has been generated with the results. This assessment was performed in accordance with a methodology described in NIST 800-30 Rev 1 to identify the following: Vulnerabilities using the CVSS model Severity Likelihood of occurrence Table A. Risk ClassificationsRisk LevelDescriptionHighThe loss of confidentiality, integrity, or availability may be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.ModerateThe loss of confidentiality, integrity, or availability may be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.LowThe loss of confidentiality, integrity, or availability may be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. Table B. Severity Severity Level (CVSS Model)DescriptionCritical Exploitation of the vulnerability likely results in root-level compromise of servers or infrastructure devices. Exploitation is usually straightforward in the sense that the attacker does not need any special authentication credentials or knowledge about individual victims and does not need to persuade a target user, for example, via social engineering, to perform any special functions.High The vulnerability is difficult to exploit. Exploitation could result in elevated privileges. Exploitation could result in significant data loss or downtime.Medium Vulnerabilities that require the attacker to manipulate individual victims via social engineering tactics. Denial of service vulnerabilities that are difficult to set up. Exploits that require an attacker to reside on the same local network as the victim. Vulnerabilities where exploitation provides only very limited access. Vulnerabilities that require user privileges for successful exploitation. LowExploitation of such vulnerabilities usually requires local or physical system access and would have little impact on the organization. Table C. Level of Effort Level of EffortDescriptionHighThis requires a high level of dedicated effort from one or more teams on critical systems, including patching, multiple configuration changes, or highly technical changes that risk bringing services down.ModerateThis is a medium-level effort that requires substantial dedication from a partial or entire team. This could impact services or cause a partial outage.LowThese are individual or small team efforts generally requiring a minimal time commitment and require running an update or remedial command or series of commands that will not impact production services. Table D. System InventorySystem ComponentsServersVirtualized farm running on Hyper-V (2 hosts). Windows Server 2019 and Ubuntu Linux. Approximately 20 virtualized servers (across the 2 hosts), including the following roles: (Ubuntu Linux) FTP server for EDI Incoming Operations 3x Domain Controllers (1 used for M365 identity sync)1x File Storage/Server 1x Ruby On Rails server 3x ElasticSearch servers (cluster)5x web application servers (Ubuntu Linux cluster, 1x PostGRESQL, 1x MariaDB SQL,3x running nginX Plus w\reverse caching proxy, 1x running Apache Tomcat, PHP 8, hosting SSL/TLS certificates)4x Remote Desktop Servers for internal shared/applications 2x legacy Exchange servers (post-migration)75 WorkstationsWindows XP,7,10/11 Pro, Ubuntu Linux, MacOSSwitchesHPE JL262A Aruba 2930F 48G PoE+ Firewall2x Sophos XG firewallsBorder routerVerizon FIOS router (CR1000A)Laptops Windows 10,11, Ubuntu 22.04 LTS, MacOS (Ventura, Monterey, Big Sur)Wireless Access Points10x HPE JZ337A Aruba AP-535Cable plantCat6a Table E. Risk IdentificationRisk #Vulnerability (NVT Name)NVT OIDSeverityRiskLevel of Effort1Distributed Ruby (dRuby/DRb) Multiple Remote Code Execution Vulnerabilities1.3.6.1.4.1.25623.1.0.108010CriticalHighHigh2MFA not enforced across all users HighHighHigh3Rexec service is running1.3.6.1.4.1.25623.1.0.100111HighHighLow4All users have local administrative privileges MediumModerateHigh5Java RMI Server Insecure Default Configuration Remote Code Execution Vulnerability on publicly-facing server1.3.6.1.4.1.25623.1.0.140051CriticalHighModerate6Operating System (OS) End of Life (EOL) Detection1.3.6.1.4.1.25623.1.0.103674CriticalHighLow7rlogin Passwordless Login1.3.6.1.4.1.25623.1.0.113766HighModerateLow8Apache Tomcat AJP RCE Vulnerability (Ghostcat)1.3.6.1.4.1.25623.1.0.143545CriticalHighModerate9PostgreSQL weak password1.3.6.1.4.1.25623.1.0.103552HighHighLow10PostgreSQL admin is reachable from internet CriticalHighLow11VNC Brute Force Login1.3.6.1.4.1.25623.1.0.106056HighHighLow12FTP Brute Force Logins Reporting1.3.6.1.4.1.25623.1.0.108718HighHighLow13phpinfo() output Reporting1.3.6.1.4.1.25623.1.0.11229HighModerateLow14vsftpd Compromised Source Packages Backdoor Vulnerability1.3.6.1.4.1.25623.1.0.103185HighHighModerate15rsh Unencrypted Cleartext Login1.3.6.1.4.1.25623.1.0.100080HighModerateModerate16SSL/TLS: OpenSSL CCS Man in the Middle Security Bypass Vulnerability1.3.6.1.4.1.25623.1.0.105042HighModerateModerate17Anonymous FTP Login Reporting1.3.6.1.4.1.25623.1.0.900600Moderate Low18Samba MS-RPC Remote Shell Command Execution Vulnerability - Active Check1.3.6.1.4.1.25623.1.0.108011HighModerateHigh19SSL/TLS: Deprecated SSLv2 and SSLv3 Protocol Detection1.3.6.1.4.1.25623.1.0.111012ModerateModerateModerate20Weak Host Key Algorithm(s)(SSH)1.3.6.1.4.1.25623.1.0.117687ModerateModerateModerate

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions