Tectia SSH Server Authentication Bypass

critical Nessus Plugin ID 63156

Synopsis

An SSH server running on the remote host is affected by an authentication bypass vulnerability.

Description

The version of Tectia SSH Server running on the remote host is affected by an authentication bypass vulnerability. A remote, unauthenticated attacker can bypass authentication by sending a specially crafted request, allowing the attacker to authenticate as root.

The software is only vulnerable when running on Unix or Unix-like operating systems.

Solution

Disable password authentication in the ssh-server-config.xml configuration file (this file needs to be created if it does not already exist). Refer to the vendor's advisory for more information.

See Also

https://seclists.org/fulldisclosure/2012/Dec/12

https://seclists.org/fulldisclosure/2012/Dec/64

http://www.nessus.org/u?7b7686fa

Plugin Details

Severity: Critical

ID: 63156

File Name: ssh_tectia_server_auth_bypass.nasl

Version: 1.18

Type: remote

Published: 12/5/2012

Updated: 7/11/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2012-5975

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ssh:tectia_server

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 12/1/2012

Exploitable With

Core Impact

Metasploit (Tectia SSH USERAUTH Change Request Password Reset Vulnerability)

Reference Information

CVE: CVE-2012-5975

BID: 56783