Rapid7 Vulnerability & Exploit Database

TCP timestamp response

Back to Search

TCP timestamp response

Severity
1
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:N)
Published
08/01/1997
Created
07/25/2018
Added
04/01/2011
Modified
03/21/2018

Description

The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.

Solution(s)

  • generic-tcp-timestamp-disable-cisco
  • generic-tcp-timestamp-disable-freebsd
  • generic-tcp-timestamp-disable-linux
  • generic-tcp-timestamp-disable-openbsd
  • generic-tcp-timestamp-disable-windows
  • generic-tcp-timestamp-disable-windows-postvista

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;