DESCRIPTION LAST UPDATED: 2025-01-20
DEFAULT SEVERITY LEVEL: MEDIUM
This report identifies hosts that have the rsync service running, bound to a network port (873/tcp, 8873/tcp) and accessible on the Internet without a password. 8873/tcp scanning was added 2025-01-19.
See https://rsync.samba.org/ and https://github.com/RsyncProject/rsync for more information.
We have also added fingerprinting of rsync instances vulnerable to CVE-2024-12084, a heap-based buffer overflow flaw with a 9.8 CVSS v3 rating. See https://kb.cert.org/vuls/id/952657 for more information. Please make sure to apply the latest patches. Instances tagged cve-2024-12084
have their severity levels set to CRITICAL. The cve-2024-12084
tagging is version based and was first added 2025-01-15. If you believe a tagging was made in error, please provide feedback! Thank you to Simon Scannell and Max Hils for the collaboration.
For a daily update of rsync instances vulnerable to CVE-2024-12084 please visit our Dashboard statistics.
For a daily update of all global rsync scan statistics please visit our rsync Dashboard statistics.
Severity levels are described here.
For more information on our scanning efforts, check out our Internet scanning summary page..
This report comes in 2 versions: for IPv4 and IPv6. IPv6 scanning was added 2025-01-15.
Filename: scan_rsync, scan6_rsync