Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
SMBv1 enabled (Remote Check)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote Windows host is prone to an unspecified remote code execution vulnerability in SMBv1 protocol. This VT has been replaced by 'Microsoft Windows SMB Server Multiple Vulnerabilities-Remote (4013389)' (OID: 1.3.6.1.4.1.25623.1.0.810810).
Insight
Insight
The remote Windows host is supporting SMBv1 and is therefore prone to an unspecified remote code execution vulnerability. This vulnerability is related to the `Shadow Brokers` group.
Solution
Solution
Disable SMB v1 and/or block all versions of SMB at the network boundary by blocking TCP port 445 with related protocols on UDP ports 137-138 and TCP port 139, for all boundary devices.