Tectia SSH Server Authentication Bypass

Critical Nessus Plugin ID 63156


An SSH server running on the remote host is affected by an authentication bypass vulnerability.


The version of Tectia SSH Server running on the remote host is affected by an authentication bypass vulnerability. A remote, unauthenticated attacker can bypass authentication by sending a specially crafted request, allowing the attacker to authenticate as root.

The software is only vulnerable when running on Unix or Unix-like operating systems.


Disable password authentication in the ssh-server-config.xml configuration file (this file needs to be created if it does not already exist). Refer to the vendor's advisory for more information.

See Also




Plugin Details

Severity: Critical

ID: 63156

File Name: ssh_tectia_server_auth_bypass.nasl

Version: $Revision: 1.11 $

Type: remote

Published: 2012/12/05

Modified: 2017/12/20

Dependencies: 10267, 11936

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 9.8

Temporal Score: 9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ssh:tectia_server

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2012/12/01

Exploitable With

Core Impact

Metasploit (Tectia SSH USERAUTH Change Request Password Reset Vulnerability)

Reference Information

CVE: CVE-2012-5975

BID: 56783

OSVDB: 88103

EDB-ID: 23082