TCP timestamp response During the vulnerability assessment

Showing results for 
Show  only  | Search instead for 
Did you mean: 

TCP timestamp response During the vulnerability assessment

L4 Transporter

In my case, the team is performing a vulnerability assessment on PA820

Vulnerability Title: TCP timestamp response.

Description: The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.


The scanning was running to the MGMT IP,


How to disable the timestamp response.


Community Team Member

Hi @Mohammed_Yasin ,


I'm pretty sure you won't be able to do this unless you root into the device and edit some config-file.

I'd recommend reaching out to support with your findings of the vulnerability assessment.




LIVEcommunity team member, CISSP
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

L4 Transporter
  • 2 replies
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!