Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Detect CIS ports


Vulnerability Assessment Details

Detect CIS ports

Vulnerability Assessment Summary
Detect banner with ncacn_http

Detailed Explanation for this Vulnerability Assessment
This detects the CIS ports by connecting to the server and
processing the buffer received.

CIS (COM+ Internet Services) are RPC over HTTP tunneling
and requires IIS to operate.
CIS ports shouldn't be visible on internet but only behind a firewall.

If you do not use this service, then disable it as it may become
a security threat in the future, if a vulnerability is discovered.

Solution:
Disable CIS with DCOMCNFG or protect CIS ports by a Firewall.
http://support.microsoft.com/support/kb/articles/Q282/2/61.ASP

For more information about CIS:
http://msdn.microsoft.com/library/en-us/dndcom/html/cis.asp

Network Security Threat Level: Low

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Alert4Web.com

Cables, Connectors

OpenBox 10Gtek # Blue Cable # for Cisco SFP-H10GB-CU3M, SFP+ Direct Attach Coppe
$21.4
OpenBox 10Gtek # Blue Cable # for Cisco SFP-H10GB-CU3M, SFP+ Direct Attach Coppe pictureCisco 2700 Series Wireless Location Appliance Model AIR-LOC 2710-L-K9
$65.0
Cisco 2700 Series Wireless Location Appliance Model AIR-LOC 2710-L-K9 pictureCisco Model DPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway
$64.99
Cisco Model DPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway pictureCISCO Dual Gigabit WAN VPN Router - RV042G-K9-NA
$114.0
CISCO Dual Gigabit WAN VPN Router - RV042G-K9-NA picture


Discussions

No Discussions have been posted on this vulnerability.