PowerProtect e IDPA: Verificação de vulnerabilidade de segurança detectada Scanner de modo NTP 6

Summary: Equipamentos PowerProtect Data Protection (DP) Series e IDPA: A verificação de vulnerabilidades de segurança detectou "Network Time Protocol (NTP) Mode 6 Scanner" no ACM/Search

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

Para resolver a vulnerabilidade de segurança do "NTP Mode 6 Scanner", atualize o arquivo de configuração do NTP conforme abaixo para desativar o modo NTP 6:

O padrão /etc/ntp.conf deve ser:

server xx.xx.xx.xx iburst


Para desativar o modo NTP 6, adicione duas linhas/etc/ntp.conf:

server xx.xx.xx.xx iburst
restrict default kod nomodify notrap nopeer noquery
restrict -6 default kod nomodify notrap nopeer noquery



Em seguida, reinicie o serviço NTP:

# service ntpd stop
# service ntpd start


 

Additional Information

Página habilite para esta vulnerabilidade:
https://www.tenable.com/plugins/nessus/97861 (Link externo)

Affected Products

PowerProtect DP4400, PowerProtect DP5300, PowerProtect DP5800, PowerProtect DP8300, PowerProtect DP8800, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, Integrated Data Protection Appliance Software , PowerProtect DP5900, PowerProtect DP8400 ...

Products

PowerProtect DP8900
Article Properties
Article Number: 000199855
Article Type: How To
Last Modified: 28 Jul 2025
Version:  4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.