This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.
The remote host is affected by a remote code execution
According to its self-reported banner, the remote host is running a
version of Dropbear SSH before 2012.55. As such, it reportedly
contains a flaw that might allow an attacker to run arbitrary code on
the remote host with root privileges if they are authenticated using a
public key and command restriction is enforced.
Note that Nessus has not tried to exploit this vulnerability but
instead has relied solely on the version in the service's banner.
Note also, in cases where the host is running ESXi 4.0 or ESXi 4.1,
VMware states in their KB article id 2037316 that this is a false
positive since administrative access is required to login via SSH so
there are no privileges to be gained by exploiting this issue. That
is true only in a default setup, not one in which SSH access has been
enabled for non-root users.
See also :
Upgrade to the Dropbear SSH 2012.55 or later.
Risk factor :
High / CVSS Base Score : 7.1
CVSS Temporal Score : 6.2
Public Exploit Available : false