CVE-2017-5243

The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions. As a result, it falls back to allowing ALL algorithms supported by the relevant version of OpenSSH and makes the installations vulnerable to a range of MITM, downgrade, and decryption attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rapid7:nexpose:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:27

Type Values Removed Values Added
References () https://community.rapid7.com/community/nexpose/blog/2017/05/31/r7-2017-13-nexpose-hardware-appliance-ssh-enabled-obsolete-algorithms-cve-2017-5243 - Vendor Advisory () https://community.rapid7.com/community/nexpose/blog/2017/05/31/r7-2017-13-nexpose-hardware-appliance-ssh-enabled-obsolete-algorithms-cve-2017-5243 - Vendor Advisory

Information

Published : 2017-06-06 16:29

Updated : 2024-11-21 03:27


NVD link : CVE-2017-5243

Mitre link : CVE-2017-5243

CVE.ORG link : CVE-2017-5243


JSON object : View

Products Affected

rapid7

  • nexpose
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm