The remote Windows host contains network service that is prone to a buffer overflow attack.
According to its build date, the version of the ZENworks Handheld Management Access Point process (ZfHIPCND.exe) on the remote host is affected by a buffer overflow vulnerability due to a failure to accommodate variable-sized data during initialization of a buffer. By default, this process listens on TCP port 2400. An unauthenticated, remote attacker that can connect to that port can leverage this issue to execute arbitrary code in the context of the affected application, which runs with SYSTEM privileges.
Apply ZENworks 7 Handheld Management Support Pack 1 Interim Release 4 Hot Patch 6 or later.