// For flags

CVE-2001-1473

 

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2001-01-18 CVE Published
  • 2005-04-21 CVE Reserved
  • 2024-08-08 CVE Updated
  • 2024-11-14 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-310: Cryptographic Issues
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ssh
Search vendor "Ssh"
Ssh
Search vendor "Ssh" for product "Ssh"
1.2.24
Search vendor "Ssh" for product "Ssh" and version "1.2.24"
-
Affected
Ssh
Search vendor "Ssh"
Ssh
Search vendor "Ssh" for product "Ssh"
1.2.25
Search vendor "Ssh" for product "Ssh" and version "1.2.25"
-
Affected
Ssh
Search vendor "Ssh"
Ssh
Search vendor "Ssh" for product "Ssh"
1.2.26
Search vendor "Ssh" for product "Ssh" and version "1.2.26"
-
Affected
Ssh
Search vendor "Ssh"
Ssh
Search vendor "Ssh" for product "Ssh"
1.2.27
Search vendor "Ssh" for product "Ssh" and version "1.2.27"
-
Affected
Ssh
Search vendor "Ssh"
Ssh
Search vendor "Ssh" for product "Ssh"
1.2.28
Search vendor "Ssh" for product "Ssh" and version "1.2.28"
-
Affected
Ssh
Search vendor "Ssh"
Ssh
Search vendor "Ssh" for product "Ssh"
1.2.29
Search vendor "Ssh" for product "Ssh" and version "1.2.29"
-
Affected
Ssh
Search vendor "Ssh"
Ssh
Search vendor "Ssh" for product "Ssh"
1.2.30
Search vendor "Ssh" for product "Ssh" and version "1.2.30"
-
Affected
Ssh
Search vendor "Ssh"
Ssh
Search vendor "Ssh" for product "Ssh"
1.2.31
Search vendor "Ssh" for product "Ssh" and version "1.2.31"
-
Affected