Lucene search

K
cve[email protected]CVE-2012-5975
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2012-5975

2022-10-0316:15:31
CWE-287
web.nvd.nist.gov
34
cve-2012-5975
ssh
tectia server
authentication bypass
unix
linux
password authentication

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.2 High

AI Score

Confidence

Low

0.601 Medium

EPSS

Percentile

97.8%

The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.

Affected configurations

NVD
Node
sshtectia_serverMatch6.0.4
OR
sshtectia_serverMatch6.0.5
OR
sshtectia_serverMatch6.0.6
OR
sshtectia_serverMatch6.0.7
OR
sshtectia_serverMatch6.0.8
OR
sshtectia_serverMatch6.0.9
OR
sshtectia_serverMatch6.0.10
OR
sshtectia_serverMatch6.0.11
OR
sshtectia_serverMatch6.0.12
OR
sshtectia_serverMatch6.0.13
OR
sshtectia_serverMatch6.0.14
OR
sshtectia_serverMatch6.0.17
OR
sshtectia_serverMatch6.0.18
OR
sshtectia_serverMatch6.0.19
OR
sshtectia_serverMatch6.0.20.
OR
sshtectia_serverMatch6.1.0
OR
sshtectia_serverMatch6.1.1
OR
sshtectia_serverMatch6.1.2
OR
sshtectia_serverMatch6.1.3
OR
sshtectia_serverMatch6.1.4
OR
sshtectia_serverMatch6.1.5
OR
sshtectia_serverMatch6.1.6
OR
sshtectia_serverMatch6.1.7
OR
sshtectia_serverMatch6.1.8
OR
sshtectia_serverMatch6.1.9
OR
sshtectia_serverMatch6.1.12
OR
sshtectia_serverMatch6.2.0
OR
sshtectia_serverMatch6.2.1
OR
sshtectia_serverMatch6.2.2
OR
sshtectia_serverMatch6.2.3
OR
sshtectia_serverMatch6.2.4
OR
sshtectia_serverMatch6.2.5
OR
sshtectia_serverMatch6.3.0
OR
sshtectia_serverMatch6.3.1
OR
sshtectia_serverMatch6.3.2
AND
linuxlinux_kernel

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.2 High

AI Score

Confidence

Low

0.601 Medium

EPSS

Percentile

97.8%

Related for CVE-2012-5975