Treck/Kasago Network Stack Detection

info Nessus Plugin ID 137703
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

Attempts to detect the Treck network stack.

Description

The Treck/Kasago network stack appears to be running on the remote host.

Note that this plugin is based on a detection method provided by JSOF (https://www.jsof-tech.com/).

The plugin sends a special packet to the host and looks for a specific type of ICMP response packet. If the response is not received (for example, the host does not respond to the special packet or the response is blocked by a device between the scanner and the host), the plugin cannot make a determination. Failure to receive the specific type of ICMP packet in the response does not necessarily indicate that the remote host does not use the Treck/Kasago network stack.

See Also

https://www.treck.com/

Plugin Details

Severity: Info

ID: 137703

File Name: treck_detect.nbin

Version: 1.10

Type: remote

Published: 6/22/2020

Updated: 7/12/2021

Vulnerability Information

CPE: x-cpe:/a:treck:tcp_ip