CYB 240 Project One Vulnerability Summary Report
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
240
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
6
Uploaded by LieutenantGoosePerson210
CYB 240 Project One Vulnerability Summary Report
Joe Decormier
12/3/2023
Southern New Hampshire University
Identification of Vulnerability as per report:
Apache Web Server End of Life Detection 2.2.14,
Description:
This vulnerability was almost at the top of the list, and for me serves as a major issue in
which this current system has. There are many reports that are similar to this. The vulnerability
to be investigated is the Apache Web Server End of Life, this particular type is the cause of lack
of updating. This vulnerability exposes the server to a variety of exploits, especially with how
old the actual Apache server is. With the system remote code execution is a very plausible form
of attack and it needs to be upgraded. Without the upgrade the Website can be taken over,
modified, taken offline or be used to lead to a malware site. This type of attack can lead to many
issues for a company such as sensitive information leaks, distrust among consumers, legal issues,
and would affect profits. The easiest recommendation is going through the manufacturer and
receiving the patches for the fix.
Example of Incident:
Top cves actively exploited by People’s Republic of China State-sponsored Cyber Actors:
CISA
. Cybersecurity and Infrastructure Security Agency CISA. (2023, December 1).
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-279a
With the citation above is a list of attacks and causes and where the location was and gives a lot
of useful information and fixes. But the incident in the article is of our current issues and that the
attack was a remote code execution.
Remediation:
I will use the steps in the picture above as well as going into the system and updating up
to current patches. As well as going into the security and ensuring that is up to date as well. I will
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
also be going into the properties of Apache and limiting it to use only in a secure network. With
the current environment I wasn’t able to fully download any of the recent patches to update into
the newest version. This is how I would remedy this situation, but given the current constraints
of the learning environment I am unable to provide screenshots of the successful downloaded
updates or patches.
Non Server Vulnerability:
NVT: OpenSSL End of Life Detection
Description:
The summary that is given on the report that I will detail more on is as follows: OpenSSL
version on remote host has reached end of life and should not be used any more. This is a much
bigger risk than what is given on this report and should be priority number one, given the
severity of an out of date SSL(Secure Sockets Layer). An SSL is an encryption security protocol,
with this being far out of date its more than likely an easy process for those looking to decipher
the weak encryption this would use to transmit. Immediate patching is needed for this, I would
also look into updating into SSL/TSLs to remain current and stay ahead. This provides a major
risk to sensitive information and data integrity.
Example of incident:
OpenSSL vulnerability: CISA
. Cybersecurity and Infrastructure Security Agency CISA. (2023a,
November 30).
https://www.cisa.gov/news-events/ics-advisories/icsa-14-135-05
In the above website this shows a clear example of an OpenSSL end of life exploit. Gives
the affected products as well as giving the impact of what this could do.
Remediation:
Given the severity of an End of Life SSL I would highly recommend that this issue be
resolved ASAP. My recommendation would be to immediately patch and update any SSL
that is currently being used on all hosts that could affect overall workflow. Following
Patching and possible upgrading I would start testing to ensure that data integrity has been
restored. I would use penetration testing to see how the security is on the overall transport
layer and follow up and ensure security everywhere else is current. I would go over logs
and ensure there aren’t any false positives or negatives and verify overall security as a
whole. Given the constraints of my environment I wasn’t able to receive a picture of me
updating the current SSL in the report. But I was able to get a reference of impacts and
overall fixes and testing that need to take place.
References:
OpenSSL vulnerability: How to find and how to fix: Beyond security
. Vulnerability Security
Testing & DAST | Beyond Security. (2023, February 6).
https://www.beyondsecurity.com/resources/vulnerabilities/open-ssl-running-version-prior-
1-0-1i
OpenSSL vulnerability: CISA
. Cybersecurity and Infrastructure Security Agency CISA. (2023a,
November 30).
https://www.cisa.gov/news-events/ics-advisories/icsa-14-135-05
Top cves actively exploited by People’s Republic of China State-sponsored Cyber Actors: CISA
.
Cybersecurity and Infrastructure Security Agency CISA. (2023, December 1).
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-279a
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help