nginx
tcp/443
The following Cisco firewall is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since multiple CVEs allow remote attackers to DoS or achieve RCE (Remote code execution) on the firewall. Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: eea4a14a4ef6fd47577723471d841e7ef3a77b93ede5cb34fef0ad19d68433ce
Found CISCO RV34X web frontend Frimware build 2019-7-12 Version: 1.0.03.16 Affected by cve-2022-20699 Affected by cve-2022-20701 Affected by cve-2022-20707 Affected by cve-2022-20708 Affected by cve-2022-20709 Affected by cve-2022-20710 Affected by cve-2022-20711 Affected by cve-2022-20712 Affected by cve-2022-20749
Open service 186.96.215.18:443
2024-11-20 15:09
HTTP/1.1 301 Moved Permanently Server: nginx Date: Wed, 20 Nov 2024 15:09:40 GMT Content-Type: text/html Content-Length: 178 Connection: close Location: ./login.html Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src 'self' data:; connect-src 'self' ws: wss:; style-src 'self' 'unsafe-inline'; font-src 'self'; child-src 'self'; object-src 'none' X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Strict-Transport-Security: max-age=31536000; includeSubDomains Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body bgcolor="white"> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>