Vulnerability Report
Lutes Inc.
Jerry Lutes
Dec 2016
, Overveiw
The purpose of this vulnerability report is to ID and classifies hole in the security of
device on the network. It should be interpreted as know issues that need to be reviewed in a
risk management review, to determine what actions should be taken. To identify the security
gaps, I scanned the pc with to different software scanning tools. I used Window Vulnerabilities
scanner and Window Baseline Security Analyzer 2.3, on the devices. These two window pc are
running window 7 and the other is running window 8 operating system. I also review the
network firewall incoming rules.
Summary of Finding
This network currently is not secure at all. The firewall as all incoming traffic there is not
rule in place at all. The vulnerability scan showed that there are 8 critical and 12 important risks
on the window 7 pc. The window 7 device has 108 security patches missing while the window 8
is missing 68. Both PC have failed the administrator scan for password standards. On top of this
there is a shortcut on the file server to the firewall that has the login credentials saved.
The firewall is allowing all incoming traffic. This is a major issue, any traffic on any port is
allowed in, since the pc is using administrator account with password as the password. The
firewall should be configured, with rules that consist of destination addresses and service ports
allowed. They should be a global deny any address on any service port to prevent unapproved
traffic. The firewall also does not have an IPS ruling on it. Since there is not IPS scanning the
packets could in there is nothing stop malicious software on the network level. The IPS will also
allow you to create additional rule to using URL, content filter, and Geo blocking. This will
provide you with a network intrusion solution.