MEDIUM
Source
CloudSploit
ID
open-cifs

Open CIFS

Determine if UDP port 445 for CIFS is open to the public

While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as CIFS should be restricted to known IP addresses.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log into the Microsoft Azure Management Console.

  2. Select the serach bar at the top and search for Network security groups. Step

  3. Select the “Network security group” that needs to be verified. Step

  4. Click on the “Name” of the selected “Network security group” to access the port configurations. Step

  5. In the “Overview” tab scroll down the page and check the “Inbound security rules” under the Settings .Step

  6. If the “CIFS” for port 445 with protocol “UDP” is showing as “Allow” for all “Source” and “Destination” then the selected “Network security group” has UDP port 445 for CIFS open to the public. Step

  7. Repeat steps number 2 - 6 to verify other “Network security groups”.

  8. Navigate to the “Network security group” and select the security group that needs to modify for restricting the CIFS protocol on port 445 to specific IP Address.Step

  9. Scroll down the left navigation panel and choose “Inbound security rules” under “Settings”.Step

  10. Click on the “Name” column of the “CIFS” protocol that needs to be modified. Under “Source” select the “IP Addresses” from the dropdown menu and enter the “Source IP addresses/CIDR ranges” as per the requirement, select the required Protocol and Action and click on the “Save” option at the top of the pane. Step

  11. Repeat step number 8 - 10 to restrict UDP port 445 to known IP addresses.