Feb 03, 2021
This release adds the beta edition of the new Metasploit Remote Check Service and fixes some issues.
New
- Metasploit Remote Check Service Beta now available: The Metasploit Remote Check Service , now available in the beta phase of its development, enhances the remote vulnerability check capabilities of Scan Engines running on Linux hosts. Try out this new service to strengthen Nexpose’s existing scanning capabilities with the power of Metasploit modules. See our new Metasploit Remote Check Service documentation for deployment guidance.
Fixes
- We fixed a credential status logging error associated with Scan Engines failing to connect to the Windows Remote Registry service that would produce inaccurate scan results in the Security Console.
- We fixed an issue with our CIS Palo Alto policy benchmarks to resolve several false negative results.
- We fixed an issue with rule 1.4.2 in our CIS Red Hat Enterprise Linux 6 version 2.1.0 policy that caused several false positives.
- We updated our fingerprinting so that Microsoft File Converter will not incorrectly trigger Microsoft Office vulnerabilities.
- When reviewing vulnerability exceptions, the toggle for the expiration date will now show the calendar when going from “Never” to “Select a date” and update accordingly when a date is selected. Updating the expiration date is now fixed and the calendar will not disappear.