Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Service detection >> Skinny Server Detection


Vulnerability Assessment Details

Skinny Server Detection

Vulnerability Assessment Summary
Detects a Skinny server

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote server supports the Skinny protocol.

Description :

The remote server is an H.323 proxy that understands the Skinny
protocol, also known as SCCP, for 'Skinny Client Control Protocol'.
Skinny is Cisco's proprietary lightweight terminal control protocol
used by some VoIP phones to communicate with Cisco CallManager or
Asterisk PBX systems.

See also :

http://en.wikipedia.org/wiki/Skinny_Client_Control_Protocol

Solution :

Limit incoming traffic to this port if desired.

Network Security Threat Level:

None

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Dell PowerEdge R630 2x E5-2630v4 2.2GHz 10 Core 64GB 8x R-Series Trays PERC H730
$3300.0
Dell PowerEdge R630 2x E5-2630v4 2.2GHz 10 Core 64GB 8x R-Series Trays PERC H730 pictureTrading/Gaming Computer | Windows7 | 6 Core | 8 Monitors | 12GB RAM | 500 GB SSD
$1700.0
Trading/Gaming Computer | Windows7 | 6 Core | 8 Monitors | 12GB RAM | 500 GB SSD pictureHP Pavilion x360 Convertible 1 TB HDD 8 GB Ram Intel Core i5-6200U 2.3 GHz 15.6"
$449.99
HP Pavilion x360 Convertible 1 TB HDD 8 GB Ram Intel Core i5-6200U 2.3 GHz 15.6Intel Xeon Quad Core 2.66GHz X5355 SLAEG 8MB LGA771 CPU Processor
$4.99
Intel Xeon Quad Core 2.66GHz X5355 SLAEG 8MB LGA771 CPU Processor picture


Discussions

No Discussions have been posted on this vulnerability.