Vulnerability Details : CVE-2001-1476
SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not.
Exploit prediction scoring system (EPSS) score for CVE-2001-1476
Probability of exploitation activity in the next 30 days: 0.40%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2001-1476
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2001-1476
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6490
-
http://www.kb.cert.org/vuls/id/565052
Exploit;Patch;US Government Resource
Products affected by CVE-2001-1476
- cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*
- cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*