![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.109795 |
Categoría: | Policy |
Título: | Linux: MAC algorithms |
Resumen: | This variable limits the types of MAC algorithms that SSH can use during; communication. MD5 and 96-bit MAC algorithms are considered weak and have been shown to increase; exploitability in SSH downgrade attacks. Weak algorithms continue to have a great deal of; attention as a weak spot that can be exploited with expanded computing power. An attacker that; breaks the algorithm could take advantage of a MiTM position to decrypt the SSH tunnel and capture; credentials and information.;; Note: This check fails if any MAC algorithms are found that are not specified in the VT preferences. |
Descripción: | Summary: This variable limits the types of MAC algorithms that SSH can use during communication. MD5 and 96-bit MAC algorithms are considered weak and have been shown to increase exploitability in SSH downgrade attacks. Weak algorithms continue to have a great deal of attention as a weak spot that can be exploited with expanded computing power. An attacker that breaks the algorithm could take advantage of a MiTM position to decrypt the SSH tunnel and capture credentials and information. Note: This check fails if any MAC algorithms are found that are not specified in the VT preferences. CVSS Score: 0.0 CVSS Vector: AV:L/AC:H/Au:S/C:N/I:N/A:N |
Copyright | Copyright (C) 2019 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |