Sample Vulnerability Assessment Report PurpleSec
Sample Vulnerability Assessment Report PurpleSec
Sample Vulnerability Assessment Report PurpleSec
Sample Vulnerability
Assessment Report -
Example Institute
Prepared By
[email protected]
Table of Contents
1. Executive Summary ............................................................................................................................. 2
2. Scan Results......................................................................................................................................... 2
3. Methodology ....................................................................................................................................... 3
4. Findings ............................................................................................................................................... 3
5. Risk Assessment .................................................................................................................................. 4
Critical Severity Vulnerability ........................................................................................................... 4
High Severity Vulnerability ............................................................................................................... 5
Medium Severity Vulnerability ......................................................................................................... 7
Low Severity Vulnerability................................................................................................................ 8
6. Recommendations ............................................................................................................................... 9
Remediation .................................................................................................................................. 10
Security Policy & Configuration ...................................................................................................... 15
1|P a ge
[email protected]
1. Executive Summary
The purpose of this vulnerability scan is to gather data on Windows and third-party software patch levels
on specified hosts in the domain. The audit was performed on “DATE” using Nessus v8.2.2.
Of the 35 hosts identified, 32 systems were found to be active and were scanned. A total of 447 unique
vulnerabilities were found during this scan. Critical, high, and medium severity vulnerabilities were found
to exist across all 32 systems.
The vulnerabilities found on the HP switches consist of TLS/SSL certificate vulnerabilities and deal mainly
with using outdated encryption suites. Though outdated/self-signed certificates on internal devices are
not as high risk as the same on external facing devices, proper, up-to-date SSL certificates should be
installed to meet best practice. Additionally, switches were found to be running variations of 3 versions
of firmware; these switches should be updated to the newest firmware supported by the vendor.
It is our recommendation that immediate action be taken to resolve these vulnerabilities by applying
patches and adjusting system configurations as necessary.
In addition, a patch and configuration management process should be implemented to continually assess
system risk level as vulnerabilities are discovered. This will ensure relevant security patches and
configurations are applied in a timely manner.
2. Scan Results
We have included supplemental material to this report consisting of the Nessus scan results and Nessus
report.
Scan Results - The scan results provide granular detail of each vulnerability, which are categorized by their
severity: critical, high, medium, and low. An expanded definition of the known threat and solutions for
remediating the vulnerability are also available.
Nessus Report – The Nessus Report provides a comprehensive analysis of the scan results.
2|P a ge
[email protected]
3. Methodology
Internal credentialed patch audits are used as a tool to gather data in order to assess the effectiveness of
“the client patching effort. Further, this data will be used to support findings and recommendations found
under the “Recommendations” section.
The scan was conducted using the Nessus Professional vulnerability scanning platform connected to the
“THE CLIENT” environment. The purpose of utilizing a scanning engine inside the network perimeter
along with valid domain credentials is to bypass existing external security controls and host-based
security measures to gain a detailed look at system configuration and patch levels. The 00.00.00.0/00
subnet was identified by “THE CLIENT”, with further specification to scan hosts residing in the “THE
CLIENT” domain.
When performing vulnerability scans, the risk of system crash or degraded performance is always
present. In order to mitigate risk of system downtime or impairment, some systems (such as network
switches or printers) are excluded from scans.
1. Network Discovery
2. Vulnerability Assessment
The network discovery phase is conducted to discover live hosts on the target network and involves
various host discovery methods such as ICMP pings, ARP pings, and TCP connections to well-known ports.
The vulnerability assessment uses data gathered during the first phase to generate the report.
4. Findings
The results from the credentialed patch audit are listed below. It is important to note that not all
identified hosts were able to be scanned during this assessment – of the 35 hosts identified by “THE
CLIENT” as belonging to the “THE CLIENT” domain, only 32 were successfully scanned. In addition, some
of the hosts scanned were not included in the host list provided.
The remainder of the hosts were either offline during scans or the supplied credentials failed to
authenticate to the hosts. Though not all hosts were not able to be scanned, the findings should be
representative of the current overall vulnerability status of hosts in the network.
A full listing of scanned hosts is available in the “Scan Results” section of this report.
• Outdated Windows Patch Levels: Many systems reported the need for patches and updates that
have been published for at least thirty-days.
• Outdated Third-Party Software: Many systems reported missing necessary security updates for
popular third-party software packages such Google Chrome, and Adobe Flash.
3|P a ge
[email protected]
5. Risk Assessment
This report identifies security risks that could
have significant impact on mission-critical
applications used in day-to-day business
operations. These risks are quantified
according to their likelihood of occurrence
and the potential damage if they occur. Risk
factors are combined to form an overall risk
index for each system, allowing you to
prioritize your remediation activities accordingly. Of the 32 systems scanned, a total of 447 unique
vulnerabilities were found.
5|P a ge
[email protected]
The version of Internet Explorer installed on
the remote host is missing Cumulative Microsoft has released
MS15-124: Cumulative Security Update 3116180. An a set of patches for
Security Update for unauthenticated remote attacker can exploit Windows Vista, 2008,
18
Internet Explorer these issues by convincing a user to visit a 7, 2008 R2, 8, RT,
(3116180) specially crafted website resulting in the 2012, 8.1, RT 8.1, 2012
execution of arbitrary code in the context of R2, and 10.
the current user.
6|P a ge
[email protected]
Medium Severity Vulnerability
84 were medium severity vulnerabilities. These vulnerabilities often provide information to attackers that
may assist them in mounting subsequent attacks on your network. These should also be fixed in a timely
manner but are not as urgent as the other vulnerabilities.
8|P a ge
[email protected]
The Microsoft Exchange install on the Delete the following registry
Microsoft Exchange
remote host contains an unspecified value:
Server Elevation of
flaw that allows an authenticated HKEY_LOCAL_MACHINE\SYSTEM\
Privilege 1
man-in-the-middle attacker to CurrentControlSet\Control\Lsa\
Vulnerability
impersonate another user and DisableLoopbackCheck as shown
(November 2018)
escalate privileges. in the advisory.
The remote Windows host is missing
a security update. It is, therefore,
affected by multiple information Microsoft has released a set of
MS16-124: Security
disclosure vulnerabilities in the kernel patches for Windows Vista, 2008,
Update for Windows 1
API that allow a local attacker, via a 7, 2008 R2, 2012, 8.1, RT 8.1,
Registry (3193227)
specially crafted application, to 2012 R2, and 10.
disclose sensitive registry
information.
6. Recommendations
Recommendations in this report are based on the available findings from the credentialed patch audit.
Vulnerability scanning is only one tool to assess the security posture of a network. The results should not
be interpreted as definitive measurement of the security posture of the “THE CLIENT” network. Other
elements used to assess the current security posture would include policy review, a review of internal
security controls and procedures, or internal red teaming/penetration testing.
Patch management and system configuration are the main security elements that need to be addressed
by “THE CLIENT”. While it is possible to remediate all discovered vulnerabilities through applying patches
or adjusting system configurations, issues will re-appear as new vulnerabilities are discovered.
It is recommended that a patch and configuration management process be implemented to audit system
risk level and configuration drift on a regular basis to ensure that relevant security patches and
configuration changes are applied in a timely manner.
9|P a ge
[email protected]
Remediation
Taking the following actions across 9 hosts will resolve 20% of the vulnerabilities on the network:
Adobe Flash Player <= 32.0.0.114 (APSB19-06): Upgrade to Adobe Flash Player
767 1
version 32.0.0.142 or later
Install KB4489881 72 1
Install KB4489891 47 1
Install KB4489880 16 1
Microsoft Malware Protection Engine < 1.1.14700.5 RCE: Enable automatic updates
to update the scan engine for the relevant antimalware applications. Refer to
11 1
Knowledge Base Article 2510781 for information on how to verify that MMPE has
been updated.
HP Insight Management Agents Multiple Vulnerabilities: Upgrade to HP Insight
8 2
Management Agents 9.0.0.0 or later.
Install KB4489878 6 2
Install KB4023307 6 2
KB4023307: Security Update for the Windows Uniscribe Remote Code Execution
Vulnerability for Microsoft Silverlight 5 (June 2017): Apply security update 6 2
KB4023307.
Install MS18-01 5 1
Install KB3185911 5 1
Install KB4480059 4 1
10 | P a g e
[email protected]
Install KB4035055 4 1
Install KB4489882 4 2
Install KB4480058 3 1
Install KB4018466 3 1
Install KB4015380 3 1
Install KB4483453 3 1
Install KB3156019 3 1
Install KB3110329 3 1
Install KB2993651 3 1
Security Updates for Exchange (Jun 2018): Microsoft has released the following
3 1
security updates to address this issue: -KB4295699 -KB4099855 -KB4099852
Install MS18-05 2 1
Install KB4457037 2 1
Install KB4483457 2 1
Install KB4470637 2 1
Install KB4457038 2 1
Install KB4344151 2 1
Install KB4344149 2 1
11 | P a g e
[email protected]
Install KB4340583 2 1
Install KB4039266 2 1
Install KB4026059 2 1
Install KB4025240 2 1
Install KB4015068 2 1
Install KB4012583 2 1
Install KB3170455 2 1
Install KB3157569 2 1
Install KB3126446 2 1
Install KB3133043 2 2
Install KB3126587 2 2
Install KB2538243 1 1
Install KB3135995 1 1
Install KB4489876 1 1
Install KB4093223 1 1
Install KB4048970 1 1
Install KB4025674 1 1
12 | P a g e
[email protected]
Install KB4022750 1 1
Install KB4018821 1 1
Install KB4015383 1 1
Install KB4014793 1 1
Install KB4014652 1 1
Install KB3216775 1 1
Install KB3197655 1 1
Install KB3196726 1 1
Install KB3196718 1 1
Install KB3188726 1 1
Install KB4480057 1 1
Install KB3184943 1 1
Install KB3156017 1 1
Install KB3153704 1 1
Install KB3135994 1 1
Install KB3109560 1 1
Install KB3097997 1 1
13 | P a g e
[email protected]
Install KB3084135 1 1
Install KB3076895 1 1
Install KB3075220 1 1
Install KB3004365 1 1
Install KB3000483 1 1
Install KB2957189 1 1
HP Version Control Agent (VCA) < 7.3.3 Multiple SSL Vulnerabilities: Upgrade to VCA
0 2
7.3.3 or later.
14 | P a g e
[email protected]
Security Policy & Configuration
All services users authenticate against, such as an internal Active Directory environment or a third-party
provider of a CMS application, include some kind of security policy. Typically, this includes criteria around
passwords, administrative access, and auditing.
15 | P a g e
[email protected]