![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.106447 |
Categoría: | CISCO |
Título: | Cisco IOS Software SSH X.509 Authentication Bypass Vulnerability |
Resumen: | A vulnerability in the implementation of X.509 Version 3 for SSH;authentication functionality in Cisco IOS Software could allow an unauthenticated, remote attacker to bypass;authentication on an affected system. |
Descripción: | Summary: A vulnerability in the implementation of X.509 Version 3 for SSH authentication functionality in Cisco IOS Software could allow an unauthenticated, remote attacker to bypass authentication on an affected system. Vulnerability Insight: The vulnerability is due to improper validation of X.509 signatures during the SSH authentication phase. An attacker could exploit this vulnerability by presenting an invalid X.509 signature to an affected system. Vulnerability Impact: A successful exploit could allow the attacker to impersonate an existing valid user over an SSH connection. Solution: See the referenced vendor advisory for a solution. CVSS Score: 5.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-6474 BugTraq ID: 94773 http://www.securityfocus.com/bid/94773 http://www.securitytracker.com/id/1037420 |
Copyright | Copyright (C) 2016 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |