Vulnerabilities
Vulnerable Software
Ssh:  >> Tectia Server  >> 6.0.7  Security Vulnerabilities
SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected.
CVSS Score
8.8
EPSS Score
0.005
Published
2021-03-15
SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected.
CVSS Score
7.8
EPSS Score
0.001
Published
2021-03-15
SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected.
CVSS Score
7.0
EPSS Score
0.001
Published
2021-03-15
The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
CVSS Score
9.3
EPSS Score
0.257
Published
2012-12-04


Contact Us

Shodan ® - All rights reserved