HallazgosINTERGRUPO 27 01 23

You might also like

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 10

QID Vulnerabilidad IP DNS

EOL/Obsolete Software: Microsoft SQL


106085 Server 2012 Service Pack 4 (SP4) 10.66.3.60 vnttpmde37.proteccion.local
Detected

Microsoft SQL Server Elevation of


91721 10.18.0.73 pr02w068.proteccion.local
Privilege Vulnerability - January 2021

38863 Weak SSL/TLS Key Exchange 10.66.3.60 vnttpmde37.proteccion.local

OpenSSH Commands Information


42382 10.66.4.24 0
Disclosure Vulnerability

OpenSSH J-PAKE Session Key Retrieval


42384 10.66.4.24 0
Vulnerability

OpenSSH LoginGraceTime Denial of


42413 10.66.4.24 0
Service Vulnerability

OpenSSH Commands Information


42382 10.66.4.23 0
Disclosure Vulnerability

OpenSSH J-PAKE Session Key Retrieval


42384 10.66.4.23 0
Vulnerability

OpenSSH LoginGraceTime Denial of


42413 10.66.4.23 0
Service Vulnerability

Secure Sockets Layer/Transport Layer


38628 Security (SSL/TLS) Server supports 10.66.3.70 nttpmde85.proteccion.local
Transport Layer Security (TLSv1.0)

Birthday attacks against TLS ciphers


38657 with 64bit block size vulnerability 10.66.3.70 nttpmde85.proteccion.local
(Sweet32)
Remote Management Service
48169 Accepting Unencrypted Credentials 10.66.3.70 nttpmde85.proteccion.local
Detected (FTP)
Hostname Puerto Criticidad Responsable

VNTTPMDE37 0 ALTO INTERGRUPO

PR02W068 0 ALTO INTERGRUPO

VNTTPMDE37 1433 ALTO INTERGRUPO

PR01L115 0 CRITICA INTERGRUPO

PR01L115 0 CRITICA INTERGRUPO

PR01L115 0 CRITICA INTERGRUPO

PR01L114 0 CRITICA INTERGRUPO

PR01L114 0 CRITICA INTERGRUPO

PR01L114 0 CRITICA INTERGRUPO

NTTPMDE85 3389 ALTO INTERGRUPO

NTTPMDE85 3389 ALTO INTERGRUPO


NTTPMDE85 0 ALTO INTERGRUPO
Primera Deteccion Ultima Detección Severidad Estado Sistema Operativo

Microsoft Windows
07/25/2022 06:34:29 01/22/2023 23:59:00 Crítica Active
Server 2012 (64 bits)

Microsoft Windows
4/6/2022 21:41 01/22/2023 23:59:00 Alta Active
Server 2012 (64 bits)

Microsoft Windows
05/20/2022 06:20:33 01/22/2023 23:59:00 Alta Active
Server 2012 (64 bits)

3/3/2022 19:23 01/22/2023 23:59:00 Media Active Linux

3/3/2022 19:23 01/22/2023 23:59:00 Media Active Linux

3/3/2022 19:23 01/22/2023 23:59:00 Media Active Linux

3/3/2022 19:10 01/22/2023 23:59:00 Media Active Linux

3/3/2022 19:10 01/22/2023 23:59:00 Media Active Linux

3/3/2022 19:10 01/22/2023 23:59:00 Media Active Linux

Microsoft Windows
05/31/2021 15:10:37 01/22/2023 23:59:00 Media Active
Server 2012 (64 bits)

Microsoft Windows
05/31/2021 15:10:37 01/22/2023 23:59:00 Media Active
Server 2012 (64 bits)
Microsoft Windows
05/31/2021 15:10:37 01/22/2023 23:59:00 Media Active
Server 2012 (64 bits)
DiferenciaTiempoRemediación

181 Caducado

232 Caducado

247 Caducado

325 Caducado

325 Caducado

325 Caducado

325 Caducado

325 Caducado

325 Caducado

601 Caducado

601 Caducado
601 Caducado
Users are advised to obtain the SQL Server 2012

Customers are advised to refer to CVE-2021-1636 (https://

Microsoft SQL Server(CVE-2

Chan

Upgrade to Open

Upgrade to Open

Customers are advised to upgrade to OpenSSH 6

Upgrade to Open

Upgrade to Open

Customers are advised to upgrade to OpenSSH 6

Disable the use o

More information can be found at Sweet32 (https://sweet32.info/), Microsoft Windows TLS changes docs (https:/
(https://
Using strong cryptography, re

You might also like