This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.
Routing tables can be modified.
It was possible to poison the remote host routing tables through the
An attacker may use this to hijack network connections.
Several RIP agents reject routes that are not sent by a neighbor, so
this flaw may not be exploitable from a non-adjacent network.
Either disable the RIP listener if it is not used, use RIP-2 in
conjunction with authentication, or use another routing protocol.
Risk factor :
Medium / CVSS Base Score : 5.8
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now