Threat Encyclopedia



This indicates an attack attempt to launch a remote command shell.
Attackers may inject shell code or run a malicious script that can bring up a command prompt as a remote console. This provides attackers with complete access to the victim system without any authentication.

affected-products-logoAffected Products

Any unprotected Windows or Linux system is vulnerable to the attack.

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Monitor the traffic from that network for any suspicious activity.
Use AntiVirus software to scan and clean the system.

Telemetry logoTelemetry