This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote Windows host is configured to use an insecure authentication
The remote host is configured to attempt LM and/or NTLMv1 for outbound
authentication. These protocols use weak encryption. A remote attacker
who is able to read LM or NTLMv1 challenge and response packets could
exploit this to get a user's LM or NTLM hash, which would allow an
attacker to authenticate as that user.
See also :
Change the LmCompatibilityLevel setting to 3 or higher.
Risk factor :
Medium / CVSS Base Score : 6.8
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now