Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Google Secure Access VPN Client Installed


Vulnerability Assessment Details

Google Secure Access VPN Client Installed

Vulnerability Assessment Summary
Acertains the presence of the Google Secure Access

Detailed Explanation for this Vulnerability Assessment

Summary :

A potentially unauthorized VPN connection is installed on the remote host

Description :

The remote host has the program 'Google Secure Access' installed. This software
is a VPN client permiting roaming users to establish a VPN connection with
Google's VPN server, thus protecting the local communications from being
eavesdropped by a local user. This potentially permits Google to eavesdrop
on the communications of the remote user.

Make sure that the remote installation of Google Secure Access has been done in
accordance to your security policy.

Solution :

Disable this software if it does not match your corporate security policy.

See also :

http://wifi.google.com

Network Security Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:L/Au:R/C:P/A:N/I:N/B:C)

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

SAMSUNG 860 EVO Series 2.5" 500GB SATA III 860 evo SSD # MZ-76E500
$94.0
SAMSUNG 860 EVO Series 2.5SAMSUNG Galaxy Tab 4 SM-T230NU 8GB Wi-Fi 7in-Black - Android ****EXCELLENT****
$59.99
SAMSUNG Galaxy Tab 4 SM-T230NU 8GB Wi-Fi 7in-Black - Android  ****EXCELLENT**** pictureSamsung 850 EVO 500GB Internal 2.5" (MZ-75E500B/AM) SSD
$60.0
Samsung 850 EVO 500GB Internal 2.5


Discussions

No Discussions have been posted on this vulnerability.