Family: Misc. --> Category: attack
RIP poisoning Vulnerability Scan
Vulnerability Scan Summary
Poison routing tables through RIP
Detailed Explanation for this Vulnerability Test
It was possible to poison the remote host routing tables through
the RIP protocol.
A possible hacker may use this to hijack network connections.
Solution : use RIP-2 and implement authentication,
or use another routing protocol,
or disable the RIP listener if you don't need it.
Threat Level: Low
Click HERE for more information and discussions on this network vulnerability scan.