Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Service detection >> ARCserve Backup for Laptops & Desktops Server Detection


Vulnerability Assessment Details

ARCserve Backup for Laptops & Desktops Server Detection

Vulnerability Assessment Summary
Detects an ARCserve Backup for Laptops & Desktops Server

Detailed Explanation for this Vulnerability Assessment

Summary :

There is a backup service running on the remote host.

Description :

BrightStor ARCserve Backup for Laptops & Desktops Server / BrightStor
Mobile Backup Server, an enterprise class backup solution for remote
and mobile Windows-based PCs, is installed on the remote host. And
the service listening on this port is used by clients to backup and
restore files.

See also :

http://www3.ca.com/smb/product.aspx?id=5286

Solution :

Limit incoming traffic to this port if desired.

Network Security Threat Level:

None

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Seagate ST1000DM003 | 1 TB, 7200 RPM, 64MB Cache AND Seagate ST500DM002 | 500 G
$30.0
Seagate ST1000DM003 | 1 TB, 7200 RPM, 64MB Cache AND Seagate ST500DM002 | 500 G pictureApple Macbook Pro 15" 2.6Ghz ~ Quad-Core i7 ~ 8GB RAM~1TB SSHD~ MD104LL/A
$699.0
Apple Macbook Pro 15Samsung 850 EVO 1000GB 1TB Solid State Hard Disk Drive SSD MZ-75E1T0 MZ7LN1T0
$215.0
Samsung 850 EVO 1000GB 1TB Solid State Hard Disk Drive SSD MZ-75E1T0 MZ7LN1T0 pictureIBM SYSTEM X3650 M3 8B SERVER E5520 2.26GHZ 48GB 7 X 1TB SAS
$2659.0
IBM SYSTEM X3650 M3 8B SERVER E5520 2.26GHZ 48GB 7 X 1TB SAS picture


Discussions

No Discussions have been posted on this vulnerability.