SOCKS v3 daemon misconfigured

Risk Level: High risk vulnerability  High

Check or Attack Name: SOCKS

Platforms: Any
Description:

An insecure SOCKS v3.0 service configuration was detected. This configuration permits attackers to access the network through the gateway host, and bypass proxy server controls and services normally relayed securely. Connections to the following services occur through the SOCKS proxy: FTP, Telnet, Sendmail (SMTP), Finger, HTTP, and POP3.

Remedy:

Verify the proxy rules and reconfigure as needed. For more information, see your vendor's documentation.

References:

X-Force Logo
Know Your Risks