The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions. As a result, it falls back to allowing ALL algorithms supported by the relevant version of OpenSSH and makes the installations vulnerable to a range of MITM, downgrade, and decryption attacks.
References
Configurations
History
21 Nov 2024, 03:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.rapid7.com/community/nexpose/blog/2017/05/31/r7-2017-13-nexpose-hardware-appliance-ssh-enabled-obsolete-algorithms-cve-2017-5243 - Vendor Advisory |
Information
Published : 2017-06-06 16:29
Updated : 2024-11-21 03:27
NVD link : CVE-2017-5243
Mitre link : CVE-2017-5243
CVE.ORG link : CVE-2017-5243
JSON object : View
Products Affected
rapid7
- nexpose
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm