NFS Improper UID & NFS Exported Share Read Access

Posted on 2016-11-02
Last Modified: 2016-11-18
These 2 items show up on my vulnerability scan of my HP Laser Jet p3015

Can someone please explain them to me  and if they can be shut off
Question by:syarmush
  • 4
  • 3
LVL 61

Expert Comment

ID: 41875644
What items?

Author Comment

ID: 41877466
NFS Improper UID & NFS Exported Share Read Access
LVL 61

Expert Comment

ID: 41877597
Can you post them one per paragraph with full text of finding/test?
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.


Author Comment

ID: 41877897
The remote system is running an NFS server which is configured
in such a way that it allows unauthenticated users to manipulate
the file system using unverified credentials. This can be
accomplished by spoofing the user ID (UID) and group ID (GID)
values in NFS RPC call packets.
An unauthenticated network-based attacker can leverage this
misconfiguration issue to access and modify sensitive files that
are present on the remote system with super user privileges. This
level of access typically results in a complete compromise of the
vulnerable system.
Solution: If the NFS service is not necessary or is not being used, disable
the service. Alternatively, if the service is relied on, the issue may
be resolved either by implementing an authentication scheme
LVL 61

Accepted Solution

gheist earned 500 total points
ID: 41882834
Easiest would be to disable NFS server (telnet to IP of JetDirect, type 'help', and look for disabling NFS printing)

Author Comment

ID: 41890574
what is NFS printing?
LVL 61

Expert Comment

ID: 41893382
Some non-standard HP protocol. Probably you upload text files and images and printer prints them...

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
USB Error 20 150
How to remove and add LOCAL printers via script 5 82
Botnet detection help me please 21 86
EXCHANGE 2007, EXCHANGE 2013 8 45
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

26 Experts available now in Live!

Get 1:1 Help Now