J-PAKE Protocol Vulnerability in OpenSSH 5.6 and Earlier

J-PAKE Protocol Vulnerability in OpenSSH 5.6 and Earlier

CVE-2010-4478 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.

Learn more about our Web Application Penetration Testing UK.