This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
The remote Windows host contains network service that is prone to a
buffer overflow attack.
According to its build date, the version of the ZENworks Handheld
Management Access Point process (ZfHIPCND.exe) on the remote host is
affected by a buffer overflow vulnerability due to a failure to
accommodate variable-sized data during initialization of a buffer.
By default, this process listens on TCP port 2400. An
unauthenticated, remote attacker that can connect to that port can
leverage this issue to execute arbitrary code in the context of the
affected application, which runs with SYSTEM privileges.
See also :
Apply ZENworks 7 Handheld Management Support Pack 1 Interim Release 4
Hot Patch 6 or later.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false