![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.109795 |
Kategorie: | Policy |
Titel: | Linux: MAC algorithms |
Zusammenfassung: | This variable limits the types of MAC algorithms that SSH can use during; communication. MD5 and 96-bit MAC algorithms are considered weak and have been shown to increase; exploitability in SSH downgrade attacks. Weak algorithms continue to have a great deal of; attention as a weak spot that can be exploited with expanded computing power. An attacker that; breaks the algorithm could take advantage of a MiTM position to decrypt the SSH tunnel and capture; credentials and information.;; Note: This check fails if any MAC algorithms are found that are not specified in the VT preferences. |
Beschreibung: | Summary: This variable limits the types of MAC algorithms that SSH can use during communication. MD5 and 96-bit MAC algorithms are considered weak and have been shown to increase exploitability in SSH downgrade attacks. Weak algorithms continue to have a great deal of attention as a weak spot that can be exploited with expanded computing power. An attacker that breaks the algorithm could take advantage of a MiTM position to decrypt the SSH tunnel and capture credentials and information. Note: This check fails if any MAC algorithms are found that are not specified in the VT preferences. CVSS Score: 0.0 CVSS Vector: AV:L/AC:H/Au:S/C:N/I:N/A:N |
Copyright | Copyright (C) 2019 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |