Skip to content

sexigraf 0.99g : OS vulnerabilities detected in banner reporting (PCI-DSS check) / severity high / CVSS v2 7.5 #294

Closed
@etrescol

Description

@etrescol

Hello team,

We get a PCI-DSS production environment and we run recurrent scan on all components which are inside the PCI-DSS perimeter. The main goal of these scans is to detect securities vulnerabilities on these components and correct them as soons as possible when the severity level is high or critical. On this PCI-DSS perimeter, we get a sexigraf appliance 0.99g and the last scan detects a vulnerability of level high on this component.

description : OS vulnerabilities detected in banner reporting (PCI-DSS check)
severity : high
CVSS v2 : 7.5
plugin (link to nessus information about this vulnerability) : http://www.nessus.org/plugins/index.php?view=single&id=108591

The plugin link proposes to update the component. Recently I saw a new version of sexigraf 0.99h so we can imagine to update it.

But according to the last version of sexigraf 0.99h (https://www.sexigraf.fr/sexigraf-0-99h-highway-17-is-out/), vSAN performance metrics will be LOST during this migration and as our actual sexigraf 0.99g appliance is connected to a VMware environment and also VMware vSAN, we do not want lose data.

The question, is it mandatory to update our actual sexigraf 0.99g appliance to correct the above vulnerability or do you get a workaround so that we can apply it on our actual sexigraf 0.99g appliance ?

Thank you for your feedbacks.

Emmanuel

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions