Compliance requirements dictate that companies must perform quarterly internal and external network vulnerability scans. There are a variety of tools that can be used for this purpose, but Nessus is a popular solution.
In this article by Roger McClinton, we get his take on a recent vulnerability listed in this tool.
This week Tenable released a new “plugin” (what they call a vulnerability detection) named “Web Server HTTP Header Information Disclosure”, plugin id 88099. In spite of even the title saying it only an information disclosure vulnerability, they rate this a medium. In my environment that means we need to address it. I think its a little crazy for an information disclosure vulnerability to be rated that high. It turns out Tenable has ceded vulnerability severity ratings to the CVSS system. So because this has a CVSS score of 5 it has to be rated moderate.
Now with SecurityCenter, I’d be able to change the security severity of this detection. I’m not sure that’s possible in Nessus. Even so, when scanning servers for other people, you cant just change the results of the scan. And now the problem, the other party’s security people don’t have the ability to make rational security decisions. They just want all the detections gone.
You can read the entire article here.