Answered step by step
Verified Expert Solution
Question
1 Approved Answer
D 4 8 2 - Secure Network Design Company B Vulnerability Report Company B performed this vulnerability assessment in anticipation of system integration with Company
D Secure Network Design Company B Vulnerability Report Company B performed this vulnerability assessment in anticipation of system integration with Company A This assessment was performed by a qualified thirdparty assessor, and this report has been generated with the results. This assessment was performed in accordance with a methodology described in NIST Rev to identify the following: Vulnerabilities using the CVSS model Severity Likelihood of occurrence Table A Risk ClassificationsRisk LevelDescriptionHighThe loss of confidentiality, integrity, or availability may be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.ModerateThe loss of confidentiality, integrity, or availability may be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.LowThe loss of confidentiality, integrity, or availability may be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. Table B Severity Severity Level CVSS ModelDescriptionCritical Exploitation of the vulnerability likely results in rootlevel compromise of servers or infrastructure devices. Exploitation is usually straightforward in the sense that the attacker does not need any special authentication credentials or knowledge about individual victims and does not need to persuade a target user, for example, via social engineering, to perform any special functions.High The vulnerability is difficult to exploit. Exploitation could result in elevated privileges. Exploitation could result in significant data loss or downtime.Medium Vulnerabilities that require the attacker to manipulate individual victims via social engineering tactics. Denial of service vulnerabilities that are difficult to set up Exploits that require an attacker to reside on the same local network as the victim. Vulnerabilities where exploitation provides only very limited access. Vulnerabilities that require user privileges for successful exploitation. LowExploitation of such vulnerabilities usually requires local or physical system access and would have little impact on the organization. Table C Level of Effort Level of EffortDescriptionHighThis requires a high level of dedicated effort from one or more teams on critical systems, including patching, multiple configuration changes, or highly technical changes that risk bringing services down.ModerateThis is a mediumlevel effort that requires substantial dedication from a partial or entire team. This could impact services or cause a partial outage.LowThese are individual or small team efforts generally requiring a minimal time commitment and require running an update or remedial command or series of commands that will not impact production services. Table D System InventorySystem ComponentsServersVirtualized farm running on HyperV hosts Windows Server and Ubuntu Linux. Approximately virtualized servers across the hosts including the following roles: Ubuntu Linux FTP server for EDI Incoming Operations x Domain Controllers used for M identity syncx File StorageServer x Ruby On Rails server x ElasticSearch servers clusterx web application servers Ubuntu Linux cluster, x PostGRESQL, x MariaDB SQLx running nginX Plus wreverse caching proxy, x running Apache Tomcat, PHP hosting SSLTLS certificatesx Remote Desktop Servers for internal sharedapplications x legacy Exchange servers postmigration WorkstationsWindows XP Pro, Ubuntu Linux, MacOSSwitchesHPE JLA Aruba F G PoE Firewallx Sophos XG firewallsBorder routerVerizon FIOS router CRALaptops Windows Ubuntu LTS MacOS Ventura Monterey, Big SurWireless Access Pointsx HPE JZA Aruba APCable plantCata Table E Risk IdentificationRisk #Vulnerability NVT NameNVT OIDSeverityRiskLevel of EffortDistributed Ruby dRubyDRb Multiple Remote Code Execution VulnerabilitiesCriticalHighHighMFA not enforced across all users HighHighHighRexec service is runningHighHighLowAll users have local administrative privileges MediumModerateHighJava RMI Server Insecure Default Configuration Remote Code Execution Vulnerability on publiclyfacing serverCriticalHighModerateOperating System OS End of Life EOL DetectionCriticalHighLowrlogin Passwordless LoginHighModerateLowApache Tomcat AJP RCE Vulnerability GhostcatCriticalHighModeratePostgreSQL weak passwordHighHighLowPostgreSQL admin is reachable from internet CriticalHighLowVNC Brute Force LoginHighHighLowFTP Brute Force Logins ReportingHighHighLowphpinfo output ReportingHighModerateLowvsftpd Compromised Source Packages Backdoor VulnerabilityHighHighModeratersh Unencrypted Cleartext LoginHighModerateModerateSSLTLS: OpenSSL CCS Man in the Middle Security Bypass VulnerabilityHighModerateModerateAnonymous FTP Login ReportingModerate LowSamba MSRPC Remote Shell Command Execution Vulnerability Active CheckHighModerateHighSSLTLS: Deprecated SSLv and SSLv Protocol DetectionModerateModerateModerateWeak Host Key AlgorithmsSSHModerateModerateModerate
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started