PowerProtect and IDPA: Security Vulnerability scanning detected NTP Mode 6 Scanner

Summary: PowerProtect Data Protection (DP) Series Appliances and IDPA: Security Vulnerability scanning detected "Network Time Protocol (NTP) Mode 6 Scanner" on ACM/Search

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

To resolve the security vulnerability for "NTP Mode 6 Scanner," update the NTP configuration file as below to disable NTP mode 6:

The default /etc/ntp.conf should be:

server xx.xx.xx.xx iburst


To disable NTP Mode 6, add two lines in/etc/ntp.conf:

server xx.xx.xx.xx iburst
restrict default kod nomodify notrap nopeer noquery
restrict -6 default kod nomodify notrap nopeer noquery



Then restart the NTP service:

# service ntpd stop
# service ntpd start


 

Additional Information

Tenable page for this vulnerability:
https://www.tenable.com/plugins/nessus/97861 (External Link)

Affected Products

PowerProtect DP4400, PowerProtect DP5300, PowerProtect DP5800, PowerProtect DP8300, PowerProtect DP8800, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, Integrated Data Protection Appliance Software , PowerProtect DP5900, PowerProtect DP8400 ...

Products

PowerProtect DP8900
Article Properties
Article Number: 000199855
Article Type: How To
Last Modified: 28 Jul 2025
Version:  4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.