It is possible to collect information from the remote wireless monitoring service.
Description
The remote host is running a Kismet server and allows clients to use it to monitor wireless activity. An anonymous attacker may use the information collected to enumerate a network.
Solution
Limit incoming traffic to this port if and, if appropriate, do not allow clients to list WEP keys.