Synopsis
It is possible to connect to the remote Check Point system.
Description
The remote host seems to be a Check Point Secure Platform, and it allows connections to its web console management.
Letting attackers know that you are using this software will help them focus their attack or make them change their strategy. In addition to this, an attacker may attempt to launch a brute-force attack to log into the remote interface.
Solution
Filter incoming traffic to this port.
Plugin Details
File Name: checkpoint_secureplatform.nasl
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:checkpoint:secure_platform_ng