Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.109795
Categoría:Policy
Título:Linux: MAC algorithms
Resumen:This variable limits the types of MAC algorithms that SSH can use during; communication. MD5 and 96-bit MAC algorithms are considered weak and have been shown to increase; exploitability in SSH downgrade attacks. Weak algorithms continue to have a great deal of; attention as a weak spot that can be exploited with expanded computing power. An attacker that; breaks the algorithm could take advantage of a MiTM position to decrypt the SSH tunnel and capture; credentials and information.;; Note: This check fails if any MAC algorithms are found that are not specified in the VT preferences.
Descripción:Summary:
This variable limits the types of MAC algorithms that SSH can use during
communication. MD5 and 96-bit MAC algorithms are considered weak and have been shown to increase
exploitability in SSH downgrade attacks. Weak algorithms continue to have a great deal of
attention as a weak spot that can be exploited with expanded computing power. An attacker that
breaks the algorithm could take advantage of a MiTM position to decrypt the SSH tunnel and capture
credentials and information.

Note: This check fails if any MAC algorithms are found that are not specified in the VT preferences.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2019 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.