SOCKS v5 daemon misconfigured

Risk Level: High risk vulnerability  High

Check or Attack Name: SocksV5

Platforms: Any
Description:

An insecure SOCKS v5.0 service configuration was detected. This configuration permits attackers to access the network through the gateway host, and bypass proxy server controls and services normally relayed securely. Connections to the following services occur through the SOCKS proxy: FTP, Telnet, Sendmail (SMTP), Finger, HTTP, and POP3.

SOCKS v4 may be detected on SOCKS v5 servers if the server is backwards compatible.

Remedy:

Verify proxy rules, and reconfigure as needed. For more information, see your vendor's documentation.

References:

X-Force Logo
Know Your Risks