Security Report for TrueNAS SCALE 22.02
This is a security scan report of a default install of TrueNAS SCALE 22.02. When enabled, TrueNAS system services must be properly configured to prevent introducing any additional threat vectors. Follow industry best practices and the TrueNAS Documentation. If assistance is required, contact the iXsystems Support Team. If you are concered about results from a separate security audit that finds issues that are not listed below, contact the iXsystems Support Team for assistance.
- Known Issues: 340 (See bottom of report)
- False Flags: 0
- Critical Severity Alerts: 0
- High Severity Alerts: 0
- Medium Severity Alerts: 2
- Low Severity Alerts: 0
- Information Alerts: 29
Nessus Alert ID 51192 - SSL Certificate Cannot Be Trusted Synopsis: The SSL certificate for this service cannot be trusted.
Nessus Alert ID 57582 - SSL Self-Signed Certificate Synopsis: The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Solution: Install a proper SSL Certification to resolve these issues. Refer to the TrueNAS SCALE User Guide.
*Nessus Alert ID 12218 - mDNS Detection Synopsis: It is possible to obtain information about the remote host.
The remaining alerts are items that can be flagged as a security vulnerability by automated security scans, but are not vulnerabilities. For example, one of the listed alerts flags that TrueNAS uses an nginx web server. TrueNAS uses a web server to provide a User Interface for system configuration. This is a normal part of TrueNAS operation. The TrueNAS nginx server is current and contains all the latest security patches. If you have more specific security concerns regarding any of these alerts, please contact the iXsystems Support Team.
Nessus ID 45590 - Common Platform Enumeration (CPE) Synopsis: It was possible to enumerate CPE names that matched on the remote system.
Response:
The remote operating system matched the following CPE : cpe:/o:microsoft:windows_vista
Nessus ID 54615 - Device Type Synopsis: It is possible to guess the remote device type.
Response:
Remote device type : general-purpose Confidence level : 65
Nessus ID 35716 - Ethernet Card Manufacturer Detection Synopsis: The manufacturer can be identified from the Ethernet OUI.
Nessus ID 86420 - Ethernet MAC Addresses Synopsis : This plugin gathers MAC addresses from various sources and consolidates them into a list.
Nessus ID 10107 - HTTP Server Type and Version Synopsis : A web server is running on the remote host.
The remote web server type is : nginx The remote web server type is : Python/3.8 aiohttp/3.6.2 Ports 80, 443, 600
Nessus ID 24260 - HyperText Transfer Protocol (HTTP) Information Synopsis : Some information about the remote HTTP configuration can be extracted.
Ports 80, 443, 6000
Nessus ID 10114 - ICMP Timestamp Request Remote Date Disclosure Synopsis : It is possible to determine the exact time set on the remote host.
The remote clock is synchronized with the local clock.
If this is a concern in your operating environment, contact the iXsystems Support Team for assistance.
Nessus ID 11219 - Nessus SYN scanner Synopsis : It is possible to determine which TCP ports are open.
Ports 80, 111, 443, 6000
Nessus ID 19506 - Nessus Scan Information Synopsis : This plugin displays information about the Nessus scan.
Information about this scan : Nessus version : 8.14.0 Plugin feed version : 202105241315
Nessus ID 42823 - Non-compliant Strict Transport Security (STS) Synopsis: The remote web server implements Strict Transport Security incorrectly. Port 80
The Strict-Transport-Security header must not be sent over an unencrypted channel. Port 443 The response from the web server listening on port 80:
- does not contain a Status-Code of 301.
- does not contain a Location header field.
If this is a concern in your operating environment, contact the iXsystems Support Team for assistance.
Nessus ID 11936 - OS Identification Synopsis: It is possible to guess the remote operating system.
Response:
Remote operating system : Microsoft Windows Vista Confidence level : 65
Nessus ID 122364 - Python Remote HTTP Detection Synopsis: Python is running on the remote host. Port 6000
Path : / Version : 3.9 Product : Python
Nessus ID 11111 - RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host.. Port 111
The following RPC services are available on TCP port 111 :
- program: 100000 (portmapper), version: 4
- program: 100000 (portmapper), version: 3
- program: 100000 (portmapper), version: 2
Nessus ID 53335 - RPC portmapper (TCP) Synopsis: An ONC RPC service is running on the remote host.. Port 111
tcp/111/rpc-portmapper
Nessus ID 10223 - RPC portmapper Service Detection Synopsis: An ONC RPC service is running on the remote host.. Port 111
udp/111/rpc-portmapper
Nessus ID 56984 - SSL / TLS Versions Supported Synopsis : The remote service encrypts communications.
tcp/443/www : This port supports TLSv1.3/TLSv1.2.
Nessus ID 10863 - SSL Certificate Information Synopsis : This plugin displays the SSL certificate.
Nessus ID 21643 - SSL Cipher Suites Supported Synopsis : The remote service encrypts communications using SSL.
Nessus ID 57041 - SSL Perfect Forward Secrecy Cipher Suites Supported Synopsis : The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.
Nessus ID 156899 - SSL/TLS Recommended Cipher Suites Synopsis : The remote host advertises discouraged SSL/TLS ciphers.
The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC
DHE-RSA-AES-128-CCM-AEAD 0xC0, 0x9E DH RSA AES-CCM(128) AEAD DHE-RSA-AES-128-CCM8-AEAD 0xC0, 0xA2 DH RSA AES-CCM8(128) AEAD DHE-RSA-AES-256-CCM-AEAD 0xC0, 0x9F DH RSA AES-CCM(256) AEAD DHE-RSA-AES-256-CCM8-AEAD 0xC0, 0xA3 DH RSA AES-CCM8(256) AEAD DHE-RSA-CHACHA20-POLY1305 0xCC, 0xAA DH RSA ChaCha20-Poly1305(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag}
Nessus ID 22964 - Service Detection Synopsis : The remote service could be identified.
tcp/80 : A web server is running on this port. tcp/443 : A TLSv1.2 server answered on this port. tcp/443 : A web server is running on this port through TLSv1.2.
Nessus ID 42822 - Strict Transport Security (STS) Detection Synopsis : The remote web server implements Strict Transport Security.
Ports: 80,443
Nessus ID 25220 - TCP/IP Timestamps Supported Synopsis : The remote service implements TCP timestamps.
Nessus ID 62564 - TLS Next Protocols Supported Synopsis : The remote service advertises one or more protocols as being supported over TLS.
Nessus ID 136318 - TLS Version 1.2 Protocol Detection Synopsis: The remote service encrypts traffic using a version of TLS.
Nessus ID 138330 - TLS Version 1.3 Protocol Detection Synopsis: The remote service encrypts traffic using a version of TLS.
Solution: The ability to control these globally is included in TrueNAS 12.0. If this is a concern in your operating environment, contact the iXsystems Support Team for assistance.
Nessus ID 10287 - Traceroute Information Synopsis : It was possible to obtain traceroute information.
Nessus ID 10386 - Web Server No 404 Error Code Check Synopsis : The remote web server does not return 404 error codes.
Ports 80, 443
All invalid URLS are redirected to the signin page.
Nessus ID 106375 - nginx HTTP Server Detection Synopsis : The nginx HTTP server was detected on the remote host.
Ports 80, 443
apache2: CVE-2021-44224 CVE-2021-44790 CVE-2021-42013
avahi: CVE-2021-3468
bsdextrautils: CVE-2022-0563
bsdutils: CVE-2022-0563
busybox: CVE-2021-28831 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386
cairo: CVE-2017-7475 CVE-2018-18064 CVE-2019-6461 CVE-2019-6462
ceph: CVE-2021-3979
consul: CVE-2021-37219 CVE-2021-38698
coreutils: CVE-2016-2781
cpio: CVE-2021-38185
curl: CVE-2021-22898 CVE-2021-22924 CVE-2021-22945 CVE-2021-22946 CVE-2021-22947
eject: CVE-2022-0563
exim4: CVE-2021-38371
fdisk: CVE-2022-0563
keepalived: CVE-2021-44225
kexec: CVE-2021-20269
libapparmor: CVE-2016-1585
libarchive: CVE-2021-23177 CVE-2021-31566
libblas3: CVE-2021-4048
libblkid1: CVE-2022-0563
libbpf: CVE-2021-45940
libc: CVE-2021-33574 CVE-2021-3998 CVE-2021-3999 CVE-2022-23218 CVE-2022-23219 CVE-2021-33574
libcuda: CVE-2022-21813 CVE-2022-21814
libexpat: CVE-2021-45960 CVE-2021-46143 CVE-2022-22822 CVE-2022-22823 CVE-2022-22824 CVE-2022-22825 CVE-2022-22826 CVE-2022-22827 CVE-2022-23852 CVE-2022-23990 CVE-2021-45960 CVE-2021-46143 CVE-2022-22822
libfdisk: CVE-2022-0563
libgcrypt: CVE-2021-33560
libgd3: CVE-2021-38115 CVE-2021-40145 CVE-2021-40812
libharfbuzz0b: CVE-2021-45931
libpbf: CVE-2021-45941
libprotobuf23: CVE-2021-22569 CVE-2021-22570
libsepol: CVE-2021-36084 CVE-2021-36085 CVE-2021-36086 CVE-2021-36087
libsmartcols1: CVE-2022-0563
libsndfile1: CVE-2021-4156
libssl: CVE-2021-4160
libtiff: CVE-2022-0561 CVE-2022-0562 CVE-2022-22844
libuuid1: CVE-2022-0563
libvirt: CVE-2021-3631 CVE-2021-3975 CVE-2021-4147
linux: CVE-2018-12928 CVE-2019-19378 CVE-2019-19449 CVE-2019-19814 CVE-2019-20794 CVE-2020-0347 CVE-2020-12362 CVE-2020-12363 CVE-2020-12364 CVE-2020-14304 CVE-2020-15802 CVE-2020-26140 CVE-2020-26142 CVE-2020-26143 CVE-2020-26555 CVE-2020-26556 CVE-2020-26557 CVE-2020-26559 CVE-2020-26560 CVE-2021-28711 CVE-2021-28712 CVE-2021-28713 CVE-2021-28714 CVE-2021-28715 CVE-2021-3669 CVE-2021-3759 CVE-2021-3847 CVE-2021-3864 CVE-2021-39685 CVE-2021-4037 CVE-2021-4095 CVE-2021-4148 CVE-2021-4149 CVE-2021-4150 CVE-2021-4155 CVE-2021-4197 CVE-2021-43976 CVE-2021-44879 CVE-2021-45095 CVE-2021-45469 CVE-2022-0330 CVE-2022-0382 CVE-2022-0400 CVE-2022-0435 CVE-2022-0480 CVE-2022-0487 CVE-2022-0492 CVE-2022-24448 CVE-2022-24958 CVE-2022-24959 CVE-2013-7445 CVE-2020-12313 CVE-2020-12317 CVE-2020-12319 CVE-2020-12321 CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2020-12313 CVE-2020-24588 CVE-2021-0127 CVE-2021-0145 CVE-2021-0146 CVE-2021-33120 CVE-2021-20269 CVE-2022-0435
lua: CVE-2019-6706 CVE-2020-24370 CVE-2021-43519 CVE-2021-35604 CVE-2021-46659 CVE-2021-46661 CVE-2021-46662 CVE-2021-46663 CVE-2021-46664 CVE-2021-46665 CVE-2021-46667 CVE-2021-46668 CVE-2021-46669 CVE-2022-24048 CVE-2022-24050 CVE-2022-24051 CVE-2022-24052
mariadb: CVE-2021-35604 CVE-2021-46659 CVE-2021-46661 CVE-2021-46662 CVE-2021-46663 CVE-2021-46664 CVE-2021-46665 CVE-2021-46667 CVE-2021-46668 CVE-2021-46669 CVE-2022-24048 CVE-2022-24050 CVE-2022-24051 CVE-2022-24052
mc: CVE-2021-36370
mount: CVE-2022-0563
nginx: CVE-2013-0337 CVE-2020-36309 CVE-2021-3618
nscd: CVE-2021-33574 CVE-2021-3998 CVE-2021-3999 CVE-2022-23218 CVE-2022-23219
nss: CVE-2021-3997 CVE-2022-22747
ntfs-3g: CVE-2021-35269 CVE-2021-39251 CVE-2021-39256 CVE-2021-39257 CVE-2021-39262 CVE-2021-39258 CVE-2021-33287 CVE-2021-33289 CVE-2021-35267 CVE-2021-39253 CVE-2021-33285 CVE-2021-35266 CVE-2021-39254 CVE-2021-39255 CVE-2021-39259 CVE-2021-33286 CVE-2021-35268 CVE-2021-39252 CVE-2021-39260 CVE-2021-39261 CVE-2021-39263
openjdk: CVE-2021-35550 CVE-2021-35556 CVE-2021-35559 CVE-2021-35561 CVE-2021-35564 CVE-2021-35565 CVE-2021-35567 CVE-2021-35578 CVE-2021-35586 CVE-2021-35603 CVE-2022-21248 CVE-2022-21277 CVE-2022-21282 CVE-2022-21283 CVE-2022-21291 CVE-2022-21293 CVE-2022-21294 CVE-2022-21296 CVE-2022-21299 CVE-2022-21305 CVE-2022-21340 CVE-2022-21341 CVE-2022-21360 CVE-2022-21365 CVE-2022-21366
openssh: CVE-2021-41617
openssl: CVE-2021-4160 CVE-2021-3712 CVE-2021-3711
ovmf: CVE-2019-14560 CVE-2021-28216 CVE-2021-38575 CVE-2021-38576
perl: CVE-2020-16156
python2: CVE-2021-23336 CVE-2021-4189
python3: CVE-2021-29921 CVE-2021-3426 CVE-2021-3733 CVE-2021-3737 CVE-2021-4189 CVE-2022-0391
python: CVE-2021-21240 CVE-2021-43818 CVE-2021-33430 CVE-2021-34141 CVE-2021-41495 CVE-2021-41496 CVE-2021-23437 CVE-2022-22815 CVE-2022-22816 CVE-2022-22817 CVE-2022-24303 CVE-2020-13757 CVE-2020-25658
policykit: CVE-2016-2568 CVE-2021-4034
qemu: CVE-2019-12067 CVE-2020-14394 CVE-2020-15469 CVE-2020-25741 CVE-2020-25742 CVE-2020-25743 CVE-2020-35503 CVE-2020-35504 CVE-2020-35505 CVE-2021-20196 CVE-2021-20203 CVE-2021-20255 CVE-2021-3507 CVE-2021-3735 CVE-2021-3750 CVE-2021-3929 CVE-2021-3930 CVE-2019-12067 CVE-2020-14394 CVE-2020-15469 CVE-2020-25741 CVE-2020-25742 CVE-2020-25743 CVE-2020-35503 CVE-2020-35504
rclone: CVE-2019-11840
squashfs: CVE-2021-40153 CVE-2021-41072
systemd: CVE-2021-3997
unzip: CVE-2022-0529 CVE-2022-0530
util-linux: CVE-2021-3996 CVE-2021-3997
varnish: CVE-2021-36740 CVE-2022-23959
vim: CVE-2021-3872 CVE-2021-3903 CVE-2021-3927 CVE-2021-3928 CVE-2021-3973 CVE-2021-3974 CVE-2021-3984 CVE-2021-4019 CVE-2021-4069 CVE-2021-4166 CVE-2021-4192 CVE-2021-4193 CVE-2022-0156 CVE-2022-0158 CVE-2022-0213 CVE-2022-0261 CVE-2022-0318 CVE-2022-0319 CVE-2022-0351 CVE-2022-0359 CVE-2022-0361 CVE-2022-0368 CVE-2022-0392 CVE-2022-0393 CVE-2022-0407 CVE-2022-0408 CVE-2022-0413 CVE-2022-0417 CVE-2022-0443 CVE-2022-0554 CVE-2022-0572
virglrenderer: CVE-2022-0135 CVE-2022-0175
zsh: CVE-2021-45444
Exposed services should be hardened according to your security needs and according to what your deployed environment will allow. An example of services that may warrant hardening would be: nginx, ntp, openipmi, rpcbind, ssh, winbind, wsdd, etc
Back to SCALE Archive