Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Service detection >> ARCserve Backup for Laptops & Desktops Server Detection


Vulnerability Assessment Details

ARCserve Backup for Laptops & Desktops Server Detection

Vulnerability Assessment Summary
Detects an ARCserve Backup for Laptops & Desktops Server

Detailed Explanation for this Vulnerability Assessment

Summary :

There is a backup service running on the remote host.

Description :

BrightStor ARCserve Backup for Laptops & Desktops Server / BrightStor
Mobile Backup Server, an enterprise class backup solution for remote
and mobile Windows-based PCs, is installed on the remote host. And
the service listening on this port is used by clients to backup and
restore files.

See also :

http://www3.ca.com/smb/product.aspx?id=5286

Solution :

Limit incoming traffic to this port if desired.

Network Security Threat Level:

None

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

TOSHIBA THNSNS128GMCP mSATA 128 GB Laptop Solid State Drive
$40.23
TOSHIBA THNSNS128GMCP mSATA 128 GB Laptop Solid State Drive pictureSabrent USB 3.0 4 Bay 2.5” Hard drive/SSD Docking Station with Fan DS-4SSD
$67.06
Sabrent USB 3.0 4 Bay 2.5” Hard drive/SSD Docking Station with Fan DS-4SSD pictureTESTED OEM - Toshiba 256GB mSATA SSD Solid State Hard Drive SSD - THNSNJ256GMCU
$72.35
TESTED OEM - Toshiba 256GB mSATA SSD Solid State Hard Drive SSD - THNSNJ256GMCU picturenew SSD UV400 2.5" 120GB SATA III TLC Internal Solid State Drive For Kingston qq
$19.87
new SSD UV400 2.5


Discussions

No Discussions have been posted on this vulnerability.