Publication Date:



A Scan attack is performed by cyber-assailants in a process of initial information-gathering known as footprinting. Scan attacks are used mostly to identify and enumerate active hosts on a network, and to determine the host operating system and available UDP and TCP network services that are running on the targeted hosts.

A successful Scan attack can result in information disclosure.

Read more

Find out the statistics of the vulnerabilities spreading in your region on

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.