PowerProtect and IDPA: Security Vulnerability scanning detected NTP Mode 6 Scanner
Summary: PowerProtect Data Protection (DP) Series Appliances and IDPA: Security Vulnerability scanning detected "Network Time Protocol (NTP) Mode 6 Scanner" on ACM/Search
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Instructions
To resolve the security vulnerability for "NTP Mode 6 Scanner," update the NTP configuration file as below to disable NTP mode 6:
The default /etc/ntp.conf should be:
server xx.xx.xx.xx iburst
To disable NTP Mode 6, add two lines in/etc/ntp.conf:
server xx.xx.xx.xx iburst
restrict default kod nomodify notrap nopeer noquery
restrict -6 default kod nomodify notrap nopeer noquery
Then restart the NTP service:
# service ntpd stop
# service ntpd start
Additional Information
Tenable page for this vulnerability:
https://www.tenable.com/plugins/nessus/97861 (External Link)
Affected Products
PowerProtect DP4400, PowerProtect DP5300, PowerProtect DP5800, PowerProtect DP8300, PowerProtect DP8800, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, Integrated Data Protection Appliance Software
, PowerProtect DP5900, PowerProtect DP8400
...
Products
PowerProtect DP8900Article Properties
Article Number: 000199855
Article Type: How To
Last Modified: 28 Jul 2025
Version: 4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.