We've contracted with IBM to perform some threat analysis of our network.
We get these qualsys reports of our vulnerabilities. They were analyzing
our domino based quickr server running on i.
One vulnerability is SMB Signing Disabled or SMB Signing Not Required
Is this something we should be concerned about? Why? What should we do
about it?
Details of threat below:
Level 2 SMB Signing Disabled or SMB Signing Not Required
QID: 90043
Category: Windows
CVE ID: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/20/2010
User Modified: -
Edited: No
THREAT:
This host does not seem to be using SMB (Server Message Block) signing.
SMB signing is a security mechanism in the SMB protocol and is also
known as security signatures. SMB signing is designed to help improve the
security of the SMB protocol.
SMB signing adds security to a network using NetBIOS, avoiding
man-in-the-middle attacks.
When SMB signing is enabled on both the client and server SMB sessions are
authenticated between the machines on a packet by packet basis.
IMPACT:
Unauthorized users sniffing the network could catch many
challenge/response exchanges and replay the whole thing to grab particular
session keys,
and then authenticate on the Domain Controller.
SOLUTION:
Without SMB signing, a device could intercept SMB network packets from an
originating computer, alter their contents, and broadcast them to the
destination computer. Since, digitally signing the packets enables the
recipient of the packets to confirm their point of origination and their
authenticity, it is recommended that SMB signing is enabled and required.
Please refer to Microsoft's article 887429 (
http://support.microsoft.com/?kbid=887429) for information on enabling SMB
signing.
COMPLIANCE:
Not Applicable
EXPLOITABILITY:
There is no exploitability information for this vulnerability.
ASSOCIATED MALWARE:
There is no malware information for this vulnerability.
RESULTS:
No results available
Rob Berendt
As an Amazon Associate we earn from qualifying purchases.