NetBackup Nessus, Qualys, or Tenable scanner 'vulnerabilities' for SSL Certificate

Article: 100013581
Last Published: 2025-07-28
Ratings: 3 1
Product(s): Appliances, NetBackup & Alta Data Protection

Problem

Vulnerability scans reports contain entries related to the NetBackup-issued SSL certificates in the environment.

Error

Errors may vary but generally will include descriptions similar to the following:

  • Medium 51192 -  SSL Certificate Cannot Be Trusted
  • Medium 57582 -  SSL Self-Signed Certificate
  • Medium 45411 -  SSL Certificate with Wrong Hostname
  • QID-38173 SSL Certificate - Signature Verification Failed Vulnerability
  • QID-38685: SSL Certificate - Invalid Maximum Validity Date Detected

Solution

NITA, NetBackup, NetBackup Appliances and OpsCenter generate a self-signed SSL certificate for the first time hostname configuration, which is by design and is not an issue.

So SSL Certificate Cannot Be Trusted, SSL Self-Signed Certificate, and Signature Verification Failed Vulnerability reported vulnerabilities can be safely ignored.

For the "SSL Certificate with Wrong Hostname" issue on appliances, a fully qualified hostname should be used for the configuration of hostname step during the appliance setup to avoid this vulnerability alert. 

 

Applies to:

  • NetBackup 7.x, 8.x, 9.x, 10.x
  • Appliances 2.x, 3.x, 4.x, 5.x
  • NetBackup Opscenter
  • NetBackup IT Analytics
  • Any security vulnerability scanning application (Nessus, Tenable, Qualys, etc.)

 

References

Etrack : 3572920

Was this content helpful?