The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions. As a result, it falls back to allowing ALL algorithms supported by the relevant version of OpenSSH and makes the installations vulnerable to a range of MITM, downgrade, and decryption attacks.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2017-14348 | The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions. As a result, it falls back to allowing ALL algorithms supported by the relevant version of OpenSSH and makes the installations vulnerable to a range of MITM, downgrade, and decryption attacks. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-08-05T14:55:35.807Z
Reserved: 2017-01-09T00:00:00
Link: CVE-2017-5243
No data.
Status : Deferred
Published: 2017-06-06T16:29:00.173
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-5243
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD