- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Good afternoon. We recently ran a nessus scan against our R80.30 3.10 gateways, and of the 8 that were scanned, 2 showed the below vulnerability.
The 2 gateways that show the vulnerability show asmtpd is running, whereas the other 6 do not. These 8 gateways are paired up in 4 different HA clusters, and the 2 showing the vulnerability are not in the same cluster. My preference would be to disable this service, as I don't believe it's required for anything we're currently doing. Can someone help point me in the right direction?
The remote SMTP service is running on a non-standard port.
This SMTP server is running on a non-standard port. This might be a backdoor set up by attackers to send spam or even control of a targeted machine.
This was an internal scan. Both gateways are running Firewall and Content Awareness, which is consistent across the board on all of our gateways.
I was able to resolve this by modifying the $FWDIR/conf/fwauthd.conf file to comment out the following line:
25 fwssd in.asmtpd wait 0
I believe a cpstop;cpstart is required after the change
Does commenting out this line prevent the SMTP service from running on non-standard ports or stop the SMTP service completely?
Thanks for confirming!
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY