![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10622 |
Category: | Service detection |
Title: | PPTP Service Detection |
Summary: | The remote host seems to be running a PPTP (VPN) service, this service; allows remote users to connect to the internal network and play a trusted rule in it. This service should; be protect with encrypted username & password combinations, and should be accessible only to trusted; individuals. By default the service leaks out such information as Server version (PPTP version), Hostname; and Vendor string this could help an attacker better prepare her next attack.;; Also note that PPTP is not configured as being cryptographically; secure, and you should use another VPN method if you can. |
Description: | Summary: The remote host seems to be running a PPTP (VPN) service, this service allows remote users to connect to the internal network and play a trusted rule in it. This service should be protect with encrypted username & password combinations, and should be accessible only to trusted individuals. By default the service leaks out such information as Server version (PPTP version), Hostname and Vendor string this could help an attacker better prepare her next attack. Also note that PPTP is not configured as being cryptographically secure, and you should use another VPN method if you can. Solution: Restrict access to this port from untrusted networks. Make sure only encrypted channels are allowed through the PPTP (VPN) connection. CVSS Score: 0.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:N |
Copyright | Copyright (C) 2005 SecuriTeam |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |