The remote Windows host contains a SCADA application that is affected by multiple buffer overflow vulnerabilities.
The installed version of RealWin is earlier than 2.1.12 (2.1 Build 22.214.171.124) and thus reportedly affected by seven heap- and stack-based buffer overflow vulnerabilities. Using a specially crafted sequence of packets to the applications services listening on TCP ports 910 and 912, an unauthenticated remote attacker who can leverage this issue to crash the affected service or to execute code on the affected host with SYSTEM-level privileges. Note that while the vendor claims the vulnerabilities only affect the demo version of RealWin, there is speculation that this is inaccurate and that use of an encryption option in the commercial version only serves to mitigate the risk of attack, not completely eliminate it. Given that new versions of both the demo and commercial versions are available, we feel the prudent course of action is for the plugin to check only the version number.
Upgrade to RealWin version 2.1.12 (2.1 Build 126.96.36.199) or later.