27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Asterisk VoIP Server Detection<br />

<strong>PVS</strong> ID: 3768 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Asterisk Voice Over IP (VoIP) Server. This service is used<br />

to manage phone calls between Internet hosts.<br />

Solution: N/A<br />

CVE Not available<br />

Asterisk VoIP Administrative Interface Detection<br />

<strong>PVS</strong> ID: 3769 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Asterisk administrative interface. This interface is used to<br />

manage the Voice Over IP (VoIP) services offered by the server.<br />

Solution: Ensure that the default settings for the web interface have been disabled or changed.<br />

Further, ensure that only trusted IP ranges can access the service.<br />

CVE Not available<br />

Cisco Call Manager (VoIP) Administrative Interface Detection<br />

<strong>PVS</strong> ID: 3770 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Cisco Call Manager administrative interface. This interface<br />

is used to manage the Voice Over IP (VoIP) services offered by the server.<br />

Solution: Ensure that the default settings for the Call Manager have been disabled or changed.<br />

Further, ensure that only trusted IP ranges can access the service.<br />

CVE Not available<br />

Cisco IP Phone Detection<br />

<strong>PVS</strong> ID: 3771 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Cisco IP Phone version/build " %L "\nFurther,<br />

the administrative page is available via an embedded web server. Unfortunately, the web<br />

server gives away critical information that an attacker can use to gain access to the VoIP<br />

device. This information includes, but is not limited to, user accounts, passwords, TFTP<br />

servers, network addresses, and phone line information. An attacker exploiting this flaw<br />

would be able to elevate access on the VoIP devices and possibly gain control of the<br />

devices.<br />

Family Internet Services 974

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!