Symantec Veritas Storage Foundation Scheduler Service (VxSchedService.exe) Remote Code Execution
High Nessus Plugin ID 25420
SynopsisArbitrary code can be executed on the remote host.
DescriptionThe remote host is running a version of Symantec Storage Foundation for Windows that is vulnerable to a remote scheduler service access. An attacker may exploit this flaw to modify or create scheduled commands and gain a full access to the system.
To exploit this flaw, an attacker would need to send requests to the TCP service listening on port 4888.