27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - manager<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Manager Community String<br />

<strong>PVS</strong> ID: 1363 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - manager<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP OrigEquipMfr Community String<br />

<strong>PVS</strong> ID: 1364 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - OrigEquipMfr<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP OrigEquipMfr Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1365 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - OrigEquipMfr<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

Family Internet Services 350

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!