Tectia SSH Server Authentication Bypass

Critical Nessus Plugin ID 63156

Synopsis

An SSH server running on the remote host is affected by an authentication bypass vulnerability.

Description

The version of Tectia SSH Server running on the remote host is affected by an authentication bypass vulnerability. A remote, unauthenticated attacker can bypass authentication by sending a specially crafted request, allowing the attacker to authenticate as root.

The software is only vulnerable when running on Unix or Unix-like operating systems.

Solution

Disable password authentication in the ssh-server-config.xml configuration file (this file needs to be created if it does not already exist). Refer to the vendor's advisory for more information.

See Also

http://seclists.org/fulldisclosure/2012/Dec/12

http://seclists.org/fulldisclosure/2012/Dec/64

http://www.nessus.org/u?7b7686fa

Plugin Details

Severity: Critical

ID: 63156

File Name: ssh_tectia_server_auth_bypass.nasl

Version: 1.13

Type: remote

Published: 2012/12/05

Modified: 2018/07/30

Dependencies: 11936, 10267

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 9.8

Temporal Score: 9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ssh:tectia_server

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2012/12/01

Exploitable With

Core Impact

Metasploit (Tectia SSH USERAUTH Change Request Password Reset Vulnerability)

Reference Information

CVE: CVE-2012-5975

BID: 56783

EDB-ID: 23082