The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions. As a result, it falls back to allowing ALL algorithms supported by the relevant version of OpenSSH and makes the installations vulnerable to a range of MITM, downgrade, and decryption attacks.
References
Configurations
History
No history.
Information
Published : 2017-06-06 16:29
Updated : 2019-10-09 23:28
NVD link : CVE-2017-5243
Mitre link : CVE-2017-5243
CVE.ORG link : CVE-2017-5243
JSON object : View
Products Affected
rapid7
- nexpose
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm