Vulnerabilities > CVE-2012-5301 - Cryptographic Issues vulnerability in Cerberusftp FTP Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The default configuration of Cerberus FTP Server before 5.0.4.0 supports the DES cipher for SSH sessions, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and performing a brute-force attack on the encrypted data.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family | FTP |
NASL id | CERBERUS_FTP_5_0_4.NASL |
description | The version of Cerberus FTP server on the remote host is earlier than 5.0.4.0. Such versions reportedly support the DES cipher for SSH sessions. This can create more favorable conditions for brute-force attacks on the encrypted network traffic. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 63558 |
published | 2013-01-16 |
reporter | This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/63558 |
title | Cerberus FTP Server < 5.0.4.0 SSH DES Cipher Weakness |