Kubernetes API Server Exposed Without Authentication

Quick Summary Kubernetes API Server Exposed Without Authentication is a critical misconfiguration where the Kubernetes control plane API is accessible without proper authentication or authorization controls. This allows unauthorized users to query cluster information, deploy workloads, access secrets, or potentially…

Open Docker API Port Without TLS

Quick Summary Open Docker API Port Without TLS is a critical misconfiguration where the Docker Remote API is exposed over TCP (commonly port 2375) without TLS encryption or authentication. This allows unauthenticated users to directly interact with the Docker daemon,…

Open Memcached Service Without Binding Restriction

Quick Summary Open Memcached Service Without Binding Restriction is a critical network misconfiguration where the Memcached service is exposed on all network interfaces without authentication or access control. This allows unauthorized users to read, modify, or flush cached data and…

Misconfigured Elasticsearch Instance Publicly Accessible

Quick Summary Misconfigured Elasticsearch Instance Publicly Accessible is a critical configuration issue where an Elasticsearch service is exposed to the public network without authentication or access restrictions. This may allow unauthorized users to query, modify, or delete indexed data, leading…

Exposed MongoDB Database Without Access Control

Quick Summary Exposed MongoDB Database Without Access Control is a critical misconfiguration where a MongoDB instance is accessible without authentication or proper network restrictions. This allows unauthorized users to connect to the database, read sensitive data, modify records, or delete…

Open Redis Instance Without Authentication

Quick Summary Open Redis Instance Without Authentication is a critical misconfiguration where the Redis database service is exposed without requiring authentication. An unauthenticated Redis instance may allow attackers to read, modify, or delete data, execute system-level actions, or gain remote…

NetBIOS Over TCP/IP Enabled

Quick Summary NetBIOS Over TCP/IP Enabled is a network service misconfiguration where the legacy NetBIOS protocol is enabled over TCP This configuration may allow attackers to enumerate system information, shared resources, and user accounts, increasing reconnaissance capabilities and exposure to…

SMBv1 Protocol Enabled

Quick Summary SMBv1 Protocol Enabled is a network service misconfiguration where the legacy Server Message Block version 1 (SMBv1) protocol is supported on the target system. SMBv1 is outdated, insecure, and vulnerable to multiple high-severity exploits. Enabling SMBv1 significantly increases…

NFS Share Exported Without Authentication

Quick Summary NFS Share Exported Without Authentication is a network service misconfiguration where a Network File System (NFS) share is exported without proper authentication or access restrictions. This may allow unauthorized users to mount the share, access sensitive files, modify…

LDAP Anonymous Bind Allowed

Quick Summary LDAP Anonymous Bind Allowed is a directory service misconfiguration where the LDAP server permits unauthenticated users to bind and query directory information without valid credentials. This may allow attackers to enumerate users, groups, email addresses, and other sensitive…

SSH Root Login Permitted

Quick Summary SSH Root Login Permitted is a security misconfiguration where the SSH service allows direct login as the root user. Permitting root-level remote authentication significantly increases the risk of complete system compromise if credentials are exposed or brute-forced. Vulnerability…

SSH Password Authentication Enabled Instead of Key-Based

Quick Summary SSH Password Authentication Enabled Instead of Key-Based is a security misconfiguration where the SSH service allows password-based authentication rather than enforcing public key authentication. Password-based SSH access significantly increases exposure to brute-force attacks, credential stuffing, and unauthorized remote…