SOCKS v3 daemon misconfigured |
---|
Risk Level: | High | Check or Attack Name: SOCKS |
---|---|---|
Platforms: | Any | |
Description: | An insecure SOCKS v3.0 service configuration was detected. This configuration permits attackers to access the network through the gateway host, and bypass proxy server controls and services normally relayed securely. Connections to the following services occur through the SOCKS proxy: FTP, Telnet, Sendmail (SMTP), Finger, HTTP, and POP3. |
|
Remedy: | Verify the proxy rules and reconfigure as needed. For more information, see your vendor's documentation. |
|
References: |
Know Your Risks |