How to remediate – Metasploit HTTP Server detection 1. Introduction 2. Technical Explanation The vulnerability occurs when a Metasploit HTTP server is running without necessary restrictions. Attackers can...
How to remediate – MikroTik RouterOS Detection 1. Introduction The MikroTik RouterOS Detection vulnerability identifies systems running MikroTik RouterOS, a Linux-based operating system used in network routers...
How to remediate – MikroTik RouterOS Winbox Detection 1. Introduction The MikroTik RouterOS Winbox Detection vulnerability indicates that a configuration service is listening on your network. This service,...
How to remediate – Milter Detection 1. Introduction Milter Detection indicates a mail filtering service is running on a remote host. This means software is inspecting...
How to remediate – Misconfigured SOCKS filtering 1. Introduction Misconfigured SOCKS filtering means network access policies might be bypassed, allowing unintended connections to your private network. This...
How to remediate – MikroTik MAC Telnet Protocol Detection 1. Introduction The MikroTik MAC Telnet Protocol Detection vulnerability indicates a remote administration service is listening on a network port....
How to remediate – MikroTik Neighbor Discovery Protocol Detection 1. Introduction The MikroTik Neighbor Discovery Protocol Detection vulnerability indicates a service listening on a port used for discovering devices...
How to remediate – Modbus/TCP Coil Access 1. Introduction The Modbus/TCP Coil Access vulnerability allows reading binary output settings, known as coils, from devices using the Modbus...
How to remediate – Modbus/TCP Device Identification 1. Introduction The Modbus/TCP Device Identification vulnerability allows an attacker to read identifying information from devices using the Modbus protocol....
How to remediate – Modbus/TCP Discrete Input Access 1. Introduction The Modbus/TCP Discrete Input Access vulnerability allows reading binary data, such as switch states and sensor readings, from...