Network Vulnerability Scanner Report
The Light Network Scanner only ran limited, version-based detection.
Upgrade to run Deep scans
that check for 20,000+ additional
vulnerabilities - with fewer False Positives
tdaunukus.uz
Summary
Overall risk level:
High
Risk ratings:
High:
4
Medium:
0
Low:
0
Info:
2
Scan information:
Start time:
Apr 06, 2024 / 06:01:43
Finish time:
Apr 06, 2024 / 06:02:28
Scan duration:
45 sec
Tests performed: 6/6
Scan status:
Finished
Findings
MySQL service exposed to the Internet
port 3306/tcp
We managed to detect a publicly accessible MySQL service.
PORT STATE SERVICE VERSION
3306/tcp open mysql MySQL 5.5.5-10.4.33-MariaDB-cll-lve-log
To reproduce this, use a tool like Nmap and issue the command as follows:
nmap -p 3306 -sV -n --open tdaunukus.uz
Details
Vulnerability description:
We identified that the MySQL service is publicly accessible. MySQL serves as a common database for numerous web applications
and services for data storage, making it a potential prime target for determined attackers.
Risk description:
The risk exists that an attacker exploits this issue by launching a password-based attack on the MySQL service. Furthermore, they
could exploit zero-day vulnerabilities to obtain remote access to the MySQL database server, thereby gaining complete control over
its operating system and associated services. Such an attack could lead to the exposure of confidential or sensitive information.
Recommendation:
We recommend turning off public Internet access to MySQL and opting for a Virtual Private Network (VPN) that enforces two-factor
authentication (2FA). Avoid enabling direct user authentication to the MySQL service via the Internet, as this could enable attackers
to engage in password-guessing and potentially initiate attacks leading to complete control. However, if the MySQL service is
required to be directly accessible over the Internet, we recommend reconfiguring it to be accessible only from known IP addresses.
Vulnerabilities found for Openssh 8.0
port 22/tcp
|