|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Service detection >> Kerio Winroute Firewall Admin Service Vulnerability Assessment Details
|
Kerio Winroute Firewall Admin Service |
||
Acertains if Kerio Winroute Firewall is installed Detailed Explanation for this Vulnerability Assessment Summary : The administrative interface of a personal firewall is listening on the remote port. Description : The remote host appears to be running Kerio Winroute Firewall Admin service. It is recommended to block incoming traffic to this port. Also, make sure the use of this software matches your corporate security policy. Solution : If this service is not needed, disable it or filter incoming traffic to this port. Network Security Threat Level: None Networks Security ID: 13458 Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Javier Munoz Mellid |
||
Cables, Connectors |
NEW Cisco C9300-48P-A 48 Port Gigabit POE+ Switch with module C9300-NM-8X
$2999.00
Cisco QSFP-100G-LR4-S 100GBASE-LR4 QSFP28, 1310nm, 10km, LC, SMF
$335.99
Cisco Nexus (N2K-C2232PP) 32-Ports Rack-Mountable Expansion module -
$62.99
Cisco WS-C3850-48P-L 48-Port Gigabit 3850 PoE Switch w/ 715W+ C3850-NM-4-1G Mod
$83.00
Cisco QSFP-40G-SR-BD BiDi Short-reach Transceiver, 1 Year Warranty
$17.25
Cisco C3850-NM-2-10G 2 Port Network Exp.Module for 3850
$38.99
Genuine Cisco SFP-10G-SR V03 10GBASE-SR SFP+ Transceiver Module 10-2415-03
$8.00
Cisco C9300-48 48 Port Switch Dual PSU W/C9300-NM-8X P/N: C9300-48U-A Tested
$799.99
Cisco Catalyst 3850 WS-C3850-48U-S 48-Port UPOE Gb Switch w/ NM-2-10G (BH)
$134.96
|
||
No Discussions have been posted on this vulnerability. |