Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Detect STUN Server

Information

Severity

Severity

Informational

Family

Family

Service detection

CVSSv2 Base

CVSSv2 Base

0.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:N

Created

Created

18 years ago

Modified

Modified

5 years ago

Summary

A VPN server is listening on the remote port. Description : The remote host is running a STUN (Simple Traversal of User Datagram Protocol - RFC 3489) server. Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) (STUN) is a lightweight protocol that allows applications to discover the presence and types of NATs and firewalls between them and the public Internet. It also provides the ability for applications to determine the public Internet Protocol (IP) addresses allocated to them by the NAT. STUN works with many existing NATs, and does not require any special behavior from them. As a result, it allows a wide variety of applications to work through existing NAT infrastructure. Make sure the use of this software is done in accordance with your corporate security policy.

Solution

Solution

If this service is not needed, disable it or filter incoming traffic to this port.