27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 6249 FAMILY: SCADA RISK: LOW NESSUS ID:Not Available<br />

Description: SCADA Alert - Distributed <strong>Network</strong> Protocol v3 'Unauthorized Read Request' alert. The<br />

remote host is running the Distributed <strong>Network</strong> Protocol version 3. This protocol is<br />

common on SCADA networks. <strong>PVS</strong> has just detected a client sending the server a code '01'<br />

message. This message instructs the remote server to divulge potentially sensitive<br />

information. An attacker, exploiting this feature, would be able to gain information useful<br />

for future attacks.<br />

realtimeonly<br />

Solution: Ensure that SCADA network is only accessible by trusted hosts.<br />

CVE Not available<br />

Distributed <strong>Network</strong> Protocol v3 'Stop Application' Alert (SCADA)<br />

<strong>PVS</strong> ID: 6250 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: SCADA Alert - Distributed <strong>Network</strong> Protocol v3 'Stop Application' alert. The remote host<br />

is running the Distributed <strong>Network</strong> Protocol version 3. This protocol is common on<br />

SCADA networks. <strong>PVS</strong> has just detected a client sending the server a code '12' message.<br />

This message instructs the remote server to stop the application. An attacker, exploiting this<br />

flaw, would need access to the SCADA network. Successful exploitation would result in<br />

the disabling of a portion (or all) of the SCADA network.<br />

realtimeonly<br />

Solution: Ensure that SCADA network is only accessible by trusted hosts.<br />

CVE Not available<br />

Distributed <strong>Network</strong> Protocol v3 'Warm Restart' Alert (SCADA)<br />

<strong>PVS</strong> ID: 6251 FAMILY: SCADA<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: SCADA Alert - Distributed <strong>Network</strong> Protocol v3 'Warm Restart' alert. The remote host is<br />

running the Distributed <strong>Network</strong> Protocol version 3. This protocol is common on SCADA<br />

networks. <strong>PVS</strong> has just detected a client sending the server a code '0E' message. This<br />

message instructs the remote server to perform a warm reboot. That is, the server will be<br />

unavailable for some time as it restarts.<br />

realtimeonly<br />

Solution: Ensure that SCADA network is only accessible by trusted hosts.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1706

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!