Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

SMBv1 enabled (Remote Check)

Information

Severity

Severity

Informational

Family

Family

Windows

CVSSv2 Base

CVSSv2 Base

0.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:N

Solution Type

Solution Type

Workaround

Created

Created

7 years ago

Modified

Modified

5 years ago

Summary

The remote Windows host is prone to an unspecified remote code execution vulnerability in SMBv1 protocol. This VT has been replaced by 'Microsoft Windows SMB Server Multiple Vulnerabilities-Remote (4013389)' (OID: 1.3.6.1.4.1.25623.1.0.810810).

Insight

Insight

The remote Windows host is supporting SMBv1 and is therefore prone to an unspecified remote code execution vulnerability. This vulnerability is related to the `Shadow Brokers` group.

Solution

Solution

Disable SMB v1 and/or block all versions of SMB at the network boundary by blocking TCP port 445 with related protocols on UDP ports 137-138 and TCP port 139, for all boundary devices.