149k views
0 votes
Identify one high severity vulnerability for each computer (if there is one). Describe the vulnerability and discuss control(s) to minimize the risk from the vulnerability.

User Adela
by
5.7k points

2 Answers

5 votes

Answer:

See the explanation section

Step-by-step explanation:

The three computers involved are:

Host 1: 192.168.100.103 Vulnerabilities: 71

Host 2: 192.168.100.105 Vulnerabilities: 49

Host 3: 192.168.100.106 Vulnerabilities: 22

The vulnerability that has high severity is user password protection. During the scan, it was observed that the default password is 'user' for user account. This was observed in two computers (Host 1 and Host 2).

This vulnerability is very dangerous because it allows unrestricted access to sensitive information or resources in an organization.

The vulnerability can be fixed by setting a limit to number of times which a user can enter invalid credential for an account. If a user reach the limit, he/she will have to contact the administrator who can re-open access for him/her.

User JCLL
by
5.6k points
4 votes

Answer:

Using old PHP versions

Step-by-step explanation:

One high risk vulnerability is the one that exists on the remote web server and involves the use of a older version of PHP that have vulnerabilities. They are certain PHP versions that are prone vulnerabilities such as buffer overflow thereby affects the codes that runs on the web database. These databases mostly store information that are of importance to most organizations.

Control measures taken to minimize this vulnerability are:

  1. upgrading to the latest PHP version and then hardening the PHP.INI file. The hardening is done by making changes to the setting in the PHP.INI file so as to boost security.
  2. Always update the system frequently. Security updates should be updated as soon as new updates are available.
User Geoff Hackworth
by
5.8k points