9.3
CVE-2012-5975
- EPSS 25.75%
- Veröffentlicht 04.12.2012 23:55:00
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ssh ≫ Tectia Server Version6.0.4
Ssh ≫ Tectia Server Version6.0.5
Ssh ≫ Tectia Server Version6.0.6
Ssh ≫ Tectia Server Version6.0.7
Ssh ≫ Tectia Server Version6.0.8
Ssh ≫ Tectia Server Version6.0.9
Ssh ≫ Tectia Server Version6.0.10
Ssh ≫ Tectia Server Version6.0.11
Ssh ≫ Tectia Server Version6.0.12
Ssh ≫ Tectia Server Version6.0.13
Ssh ≫ Tectia Server Version6.0.14
Ssh ≫ Tectia Server Version6.0.17
Ssh ≫ Tectia Server Version6.0.18
Ssh ≫ Tectia Server Version6.0.19
Ssh ≫ Tectia Server Version6.0.20.
Ssh ≫ Tectia Server Version6.1.0
Ssh ≫ Tectia Server Version6.1.1
Ssh ≫ Tectia Server Version6.1.2
Ssh ≫ Tectia Server Version6.1.3
Ssh ≫ Tectia Server Version6.1.4
Ssh ≫ Tectia Server Version6.1.5
Ssh ≫ Tectia Server Version6.1.6
Ssh ≫ Tectia Server Version6.1.7
Ssh ≫ Tectia Server Version6.1.8
Ssh ≫ Tectia Server Version6.1.9
Ssh ≫ Tectia Server Version6.1.12
Ssh ≫ Tectia Server Version6.2.0
Ssh ≫ Tectia Server Version6.2.1
Ssh ≫ Tectia Server Version6.2.2
Ssh ≫ Tectia Server Version6.2.3
Ssh ≫ Tectia Server Version6.2.4
Ssh ≫ Tectia Server Version6.2.5
Ssh ≫ Tectia Server Version6.3.0
Ssh ≫ Tectia Server Version6.3.1
Ssh ≫ Tectia Server Version6.3.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 25.75% | 0.958 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.