27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote client just logged into a SCHWEITZER ENGINEERING LABORATORIES<br />

(SEL) server (level 2 access) using the default password of TAIL.<br />

Solution: Change all default passwords upon software/server installation.<br />

CVE Not available<br />

Schweitzer Engineering Laboratories (SEL) Default telnet Account Detection (SCADA)<br />

<strong>PVS</strong> ID: 6269 FAMILY: SCADA RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote server is a SCHWEITZER ENGINEERING LABORATORIES (SEL)<br />

management server and is configured with the default level 2 Password of TAIL<br />

Solution: Change default credentials on this machine<br />

CVE Not available<br />

GE D20 TFTP Client Access Detection (SCADA)<br />

<strong>PVS</strong> ID: 6270 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote system is a GE D20 tftp client.<br />

Solution: N/A<br />

CVE Not available<br />

GE D20 TFTP Client Access Detection (SCADA)<br />

<strong>PVS</strong> ID: 6271 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote system is a GE D20 tftp client. The client has requested the file : %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

GE D20 Server TFTP File Transfer Detection (SCADA)<br />

<strong>PVS</strong> ID: 6272 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is a GE D20 SCADA device. This device allows TFTP access.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1712

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!