Question: Every IoT device found with vulnerabilities, expand on 2 or more issues and discuss how to rectify the issues and how to improve on those

Every IoT device found with vulnerabilities, expand on 2 or more issues and discuss how to rectify the issues and how to improve on those not reoccurring again. Identify those vulnerabilities found and write on each based on the solution you suggest going forward.

Router: Hosts: 1 Vulnerabilities: 15 Scan Date: February 13 Vulnerability Categories: SMB (Multiple issues), Microsoft Windows (Multiple issues), DCE Services Enumeration, Authenticated Check: OS Name and Installed Package Enumeration, Common Platform Enumeration (CPE), Ping the remote host, VMware ESX/GSX Server detection Top Threats: VPR Filter: 15 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General Info: SMB Signing not required, Host Fully Qualified Domain Name (FQDN) Resolution, Nessus Scan Information, OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library), OS Security Patch Assessment Not Available, Target Credential Status by Authentication Protocol - No Credentials Provided 2. Nintendo Switch: Hosts: 1 Vulnerabilities: 7 Scan Date: February 14 Vulnerability Categories: ICMP Timestamp Request Remote Date Disclosure, OS identification, Ping the remote host Top Threats: VPR Filter: 7 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General Info: Ethernet Card Manufacturer Detection, Nessus Scan Information 3. Smartphone: Hosts: 1 Vulnerabilities: 5 Scan Date: February 14 Vulnerability Categories: Ethernet MAC Addresses, ICMP Timestamp Request Remote Date Disclosure, Nessus Scan Information, Ping the remote host, Traceroute Information Top Threats: VPR Filter: 5 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General 4. SmartTV: Hosts: 1 Vulnerabilities: 4 Scan Date: February 14 Vulnerability Categories: Ethernet Card Manufacturer Detection, Ethernet MAC Addresses, Nessus Scan Information, Ping the remote host Top Threats: VPR Filter: 4 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: Misc. 5. Laptop: Hosts: 1 Vulnerabilities: 17 Scan Date: February 15 Vulnerability Categories: SMB (Multiple issues), Microsoft Windows (Multiple issues), DCE Services Enumeration, Authenticated Check: OS Name and Installed Package Enumeration, Common Platform Enumeration (CPE), Inconsistent Hostname and IP Address, Ping the remote host, VMware ESX/GSX Server detection Top Threats: VPR Filter: 17 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General Info: SMB Signing not required, Asset Attribute: Fully Qualified Domain Name (FQDN), OS Identification, OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library), OS Security Patch Assessment Not Available, Target Credential Status by Authentication Protocol - No Credentials Provided February 20, 2023

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!