An issue was discovered on FiberHome Fengine S5800 switches V210R240. An unauthorized attacker can access the device's SSH service, using a password cracking tool to establish SSH connections quickly. This will trigger an increase in the SSH login timeout (each of the login attempts will occupy a connection slot for a longer time). Once this occurs, legitimate login attempts via SSH/telnet will be refused, resulting in a denial of service; you must restart the device.
References
Link | Resource |
---|---|
http://www.nfcwar.com | URL Repurposed |
http://www.securityfocus.com/bid/95708 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-01-23 07:59
Updated : 2024-02-28 15:44
NVD link : CVE-2017-5544
Mitre link : CVE-2017-5544
CVE.ORG link : CVE-2017-5544
JSON object : View
Products Affected
fiberhome
- fengine_28f-s
- fengine_s5800-28t-s
- fengine_52f-s
- fengine_s5800_firmware
- fengine_s5800-28t-s-pe
- fengine_52t-s
CWE
CWE-400
Uncontrolled Resource Consumption