logo
DATABASE RESOURCES PRICING ABOUT US

Cisco Devices Multiple SSH Information Disclosure Vulnerabilities

Description

According to its version number, the remote host is a Cisco router or switch running a vulnerable SSH daemon. By exploiting weaknesses in the SSH protocol, it is possible to insert arbitrary commands into an established SSH session, collect information that may help in brute-force key recovery, or brute-force a session key.


Related