DESCRIPTION LAST UPDATED: 2023-12-16
DEFAULT SEVERITY LEVEL: HIGH
This report identifies hosts that have the Memcached key-value store running and accessible on the Internet.
Since this service does not support authentication, any entity that can access the Memcached instance can have complete control over the key-value store. In addition, instances of Memcached that are accessible via UDP may be abused in amplification-style denial of service attacks.
See memcached.org for more information about Memcached.
Track latest Memcached exposure our Dashboard.
Severity levels are described here.
For more information on our scanning efforts, check out our Internet scanning summary page..
Filenames: scan_memcached