AttachmateWRQ Reflection for Secure IT Server < 6.0 Build 24 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 3207

Synopsis

The remote host is vulnerable to multiple attack vectors.

Description

The remote host is running AttachmateWRQ Reflection for Secure IT Server, a commercial SSH server for Windows. According to its banner, the installed version of Reflection for Secure IT Server on the remote host suffers from several vulnerabilities, including :

- An Access Restriction Bypass Vulnerability. Access expressions are evaluated in a case-sensitive manner while in versions prior to 6.0 they were case-insensitive. This may let an attacker gain access to an otherwise restricted account by logging in using a variation on the account name.

- A Renamed Account Remote Login Vulnerability. The application continues to accept valid public keys for authentication to the the Administrator or Guest accounts if either has been renamed or disabled after being configured for SSH public key authentication.

- An Information Disclosure Vulnerability. Users with access to the remote host can read the server's private key, which can lead to host impersonation attacks.

Solution

Upgrade to version 6.0 build 24 or higher.

See Also

http://support.wrq.com/techdocs/1867.html

Plugin Details

Severity: Medium

ID: 3207

Family: SSH

Published: 9/6/2005

Updated: 3/6/2019

Nessus ID: 19589

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 4.6

Vector: CVSS2#AV:N/AC:H/Au:S/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5

Temporal Score: 5

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:H/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:wrq:wrq_reflection_for_secure_it_windows_server

Reference Information

CVE: CVE-2005-2770, CVE-2005-2771

BID: 14733, 14734, 14735