nginx
tcp/443
The following Cisco firewall is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since multiple CVEs allow remote attackers to DoS or achieve RCE (Remote code execution) on the firewall. Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: eea4a14a4ef6fd47577723473c4e46516e0c830728efeb8071b844ad336055ea
Found CISCO RV34X web frontend Frimware build 2020-9-17 Version: 1.0.03.20 Affected by cve-2022-20699 Affected by cve-2022-20701 Affected by cve-2022-20707 Affected by cve-2022-20708 Affected by cve-2022-20709 Affected by cve-2022-20710 Affected by cve-2022-20711 Affected by cve-2022-20712 Affected by cve-2022-20749
Open service 24.30.236.162:443
2024-04-23 23:32
HTTP/1.1 301 Moved Permanently Server: nginx Date: Tue, 23 Apr 2024 23:32:12 GMT Content-Type: text/html Content-Length: 178 Connection: close Location: ./login.html Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src 'self' data:; connect-src 'self' ws: wss:; style-src 'self' 'unsafe-inline'; font-src 'self'; child-src 'self'; object-src 'none' X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Strict-Transport-Security: max-age=31536000; includeSubDomains Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body bgcolor="white"> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>