Rapid7 Vulnerability & Exploit Database

Scanning Diagnostics: No SSH credentials with root privileges configured

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Scanning Diagnostics: No SSH credentials with root privileges configured

Severity
1
CVSS
(AV:L/AC:H/Au:M/C:N/I:N/A:N)
Published
11/02/2021
Created
11/03/2021
Added
11/02/2021
Modified
11/02/2021

Description

The following information is for Scan Diagnostic purposes only, and is not indicative of a detected vulnerability.

SSH credentials were configured but did not have root level access. Root level access to Unix targets is required in order to collect data used in both vulnerability and policy assessments. This includes installed software, and policy configuration data.

Solution(s)

  • rapid7-diagnostics-unix-variant-authenticated-with-non-root-account

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;