CYB 240 Project One Vulnerability Summary Report

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

6

Uploaded by LieutenantGoosePerson210

Report
CYB 240 Project One Vulnerability Summary Report Joe Decormier 12/3/2023 Southern New Hampshire University
Identification of Vulnerability as per report: Apache Web Server End of Life Detection 2.2.14, Description: This vulnerability was almost at the top of the list, and for me serves as a major issue in which this current system has. There are many reports that are similar to this. The vulnerability to be investigated is the Apache Web Server End of Life, this particular type is the cause of lack of updating. This vulnerability exposes the server to a variety of exploits, especially with how old the actual Apache server is. With the system remote code execution is a very plausible form of attack and it needs to be upgraded. Without the upgrade the Website can be taken over, modified, taken offline or be used to lead to a malware site. This type of attack can lead to many issues for a company such as sensitive information leaks, distrust among consumers, legal issues, and would affect profits. The easiest recommendation is going through the manufacturer and receiving the patches for the fix. Example of Incident: Top cves actively exploited by People’s Republic of China State-sponsored Cyber Actors: CISA . Cybersecurity and Infrastructure Security Agency CISA. (2023, December 1). https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-279a With the citation above is a list of attacks and causes and where the location was and gives a lot of useful information and fixes. But the incident in the article is of our current issues and that the attack was a remote code execution.
Remediation: I will use the steps in the picture above as well as going into the system and updating up to current patches. As well as going into the security and ensuring that is up to date as well. I will
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
also be going into the properties of Apache and limiting it to use only in a secure network. With the current environment I wasn’t able to fully download any of the recent patches to update into the newest version. This is how I would remedy this situation, but given the current constraints of the learning environment I am unable to provide screenshots of the successful downloaded updates or patches. Non Server Vulnerability: NVT: OpenSSL End of Life Detection Description: The summary that is given on the report that I will detail more on is as follows: OpenSSL version on remote host has reached end of life and should not be used any more. This is a much bigger risk than what is given on this report and should be priority number one, given the severity of an out of date SSL(Secure Sockets Layer). An SSL is an encryption security protocol, with this being far out of date its more than likely an easy process for those looking to decipher the weak encryption this would use to transmit. Immediate patching is needed for this, I would also look into updating into SSL/TSLs to remain current and stay ahead. This provides a major risk to sensitive information and data integrity. Example of incident:
OpenSSL vulnerability: CISA . Cybersecurity and Infrastructure Security Agency CISA. (2023a, November 30). https://www.cisa.gov/news-events/ics-advisories/icsa-14-135-05 In the above website this shows a clear example of an OpenSSL end of life exploit. Gives the affected products as well as giving the impact of what this could do. Remediation: Given the severity of an End of Life SSL I would highly recommend that this issue be resolved ASAP. My recommendation would be to immediately patch and update any SSL that is currently being used on all hosts that could affect overall workflow. Following Patching and possible upgrading I would start testing to ensure that data integrity has been restored. I would use penetration testing to see how the security is on the overall transport layer and follow up and ensure security everywhere else is current. I would go over logs and ensure there aren’t any false positives or negatives and verify overall security as a whole. Given the constraints of my environment I wasn’t able to receive a picture of me updating the current SSL in the report. But I was able to get a reference of impacts and overall fixes and testing that need to take place.
References: OpenSSL vulnerability: How to find and how to fix: Beyond security . Vulnerability Security Testing & DAST | Beyond Security. (2023, February 6). https://www.beyondsecurity.com/resources/vulnerabilities/open-ssl-running-version-prior- 1-0-1i OpenSSL vulnerability: CISA . Cybersecurity and Infrastructure Security Agency CISA. (2023a, November 30). https://www.cisa.gov/news-events/ics-advisories/icsa-14-135-05 Top cves actively exploited by People’s Republic of China State-sponsored Cyber Actors: CISA . Cybersecurity and Infrastructure Security Agency CISA. (2023, December 1). https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-279a
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help