Trusted host(s) found

Risk Level: Low risk vulnerability  Low

Check or Attack Name: Trusted Host

Platforms: Unix
Description:

A trusted host relationship between two hosts allows an attacker to use one host to gain access to a second host. All vulnerabilities found on the trusted host can then be applied to the scanned host.

Remedy:

Remove the trusted relationship and use a more secure authentication mechanism. Trusted relationships are often controlled by the contents of the /etc/hosts.equiv file and users' .rhosts files. These files should be sanity checked, and removed as necessary.

References:

X-Force Logo
Know Your Risks