Language:
https://seclists.org/fulldisclosure/2012/Dec/12
Severity: Critical
ID: 63156
File Name: ssh_tectia_server_auth_bypass.nasl
Version: 1.18
Type: remote
Family: Gain a shell remotely
Published: 12/5/2012
Updated: 7/11/2022
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 9.3
Temporal Score: 7.7
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2012-5975
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/a:ssh:tectia_server
Excluded KB Items: global_settings/supplied_logins_only
Exploit Available: true
Exploit Ease: Exploits are available
Vulnerability Publication Date: 12/1/2012
Core Impact
Metasploit (Tectia SSH USERAUTH Change Request Password Reset Vulnerability)
CVE: CVE-2012-5975
BID: 56783