| Summary | The echo service is running. |
|---|---|
| Summary | This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration. |
| Summary | The Echo Service is an unsecured and obsolete protocol and it should be disabled. Historically it has been used to perform denial of service attacks. |
| Publication Date | Jan. 1, 1999, 2 p.m. |
| Registration Date | Jan. 29, 2021, 6:03 p.m. |
| Last Update | July 13, 2007, 1 p.m. |
| CVSS2.0 : LOW | |
| Score | 0.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:N/I:N/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | なし |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |