If your report includes software versions that you don’t recognise, this could be due to shared hosting or shared cloud services.
When using software that is not under the scanned company’s direct control, such as in a shared hosting environment or a shared cloud system used by multiple companies, there may be associated risks. If the scanned company uses shared hosting or shared cloud systems, it could potentially expose the company to security vulnerabilities.
For example, we may find a risk associated with a cloud based Customer Relationship Management (CRM) system. The risk may be assigned to the scanned company, but the service itself may be provided by a third party. The scanned company may not be able to actually control the software in question, but if it’s a service that they use they could still be impacted if there was a hack or data breach.
Please refer to our article on the risks and issues associated with shared hosting and shared cloud systems. If you have any further questions, feel free to contact us via the live chat.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article