The product responds to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols. (Source: Tenable Nessus)
As this issue is assessed as low severity, users may evaluate their environments and decide if updating is required.