HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.38 Misuse of remote inquiry

T 5.38 Misuse of remote inquiry

If third parties get to know the access code of an answering machine, they can use the remote inquiry to abuse a large number of the functions of the answering machine. The most sensitive functions which can be accessed and therefore abused with remote inquiry are:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home