Vulnerabilities > CVE-2012-5301 - Cryptographic Issues vulnerability in Cerberusftp FTP Server

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
cerberusftp
CWE-310
nessus

Summary

The default configuration of Cerberus FTP Server before 5.0.4.0 supports the DES cipher for SSH sessions, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and performing a brute-force attack on the encrypted data.

Vulnerable Configurations

Part Description Count
Application
Cerberusftp
126

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

NASL familyFTP
NASL idCERBERUS_FTP_5_0_4.NASL
descriptionThe version of Cerberus FTP server on the remote host is earlier than 5.0.4.0. Such versions reportedly support the DES cipher for SSH sessions. This can create more favorable conditions for brute-force attacks on the encrypted network traffic.
last seen2020-06-01
modified2020-06-02
plugin id63558
published2013-01-16
reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/63558
titleCerberus FTP Server < 5.0.4.0 SSH DES Cipher Weakness