Rapid7 Vulnerability & Exploit Database

ICMP netmask response

Back to Search

ICMP netmask response

Severity
1
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:N)
Published
08/01/1997
Created
07/25/2018
Added
11/01/2004
Modified
06/11/2019

Description

The remote host responded to an ICMP netmask request. The ICMP netmask response contains the remote host's network mask (on the interface that processed the request). This information can be used by a hacker to accurately map your subnet structures, determining the broadcast addresses in use, and which routers are responsible for which subnets. This may make it easier for them to launch a "SMURF attack" using broadcast-directed ICMP ping packets.

Solution(s)

  • generic-icmp-netmask-block-disable-aix
  • generic-icmp-netmask-block-disable-bsd
  • generic-icmp-netmask-block-disable-general
  • generic-icmp-netmask-block-disable-hpux
  • generic-icmp-netmask-block-disable-ios
  • generic-icmp-netmask-block-disable-irix
  • generic-icmp-netmask-block-disable-linux
  • generic-icmp-netmask-block-disable-nt
  • generic-icmp-netmask-block-disable-pix
  • generic-icmp-netmask-block-disable-solaris
  • generic-icmp-netmask-block-disable-w2k-xp

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;