CVE-2001-1473
 
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2001-01-18 CVE Published
- 2005-04-21 CVE Reserved
- 2024-08-08 CVE Updated
- 2024-11-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-310: Cryptographic Issues
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.kb.cert.org/vuls/id/684820 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6603 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ssh Search vendor "Ssh" | Ssh Search vendor "Ssh" for product "Ssh" | 1.2.24 Search vendor "Ssh" for product "Ssh" and version "1.2.24" | - |
Affected
| ||||||
Ssh Search vendor "Ssh" | Ssh Search vendor "Ssh" for product "Ssh" | 1.2.25 Search vendor "Ssh" for product "Ssh" and version "1.2.25" | - |
Affected
| ||||||
Ssh Search vendor "Ssh" | Ssh Search vendor "Ssh" for product "Ssh" | 1.2.26 Search vendor "Ssh" for product "Ssh" and version "1.2.26" | - |
Affected
| ||||||
Ssh Search vendor "Ssh" | Ssh Search vendor "Ssh" for product "Ssh" | 1.2.27 Search vendor "Ssh" for product "Ssh" and version "1.2.27" | - |
Affected
| ||||||
Ssh Search vendor "Ssh" | Ssh Search vendor "Ssh" for product "Ssh" | 1.2.28 Search vendor "Ssh" for product "Ssh" and version "1.2.28" | - |
Affected
| ||||||
Ssh Search vendor "Ssh" | Ssh Search vendor "Ssh" for product "Ssh" | 1.2.29 Search vendor "Ssh" for product "Ssh" and version "1.2.29" | - |
Affected
| ||||||
Ssh Search vendor "Ssh" | Ssh Search vendor "Ssh" for product "Ssh" | 1.2.30 Search vendor "Ssh" for product "Ssh" and version "1.2.30" | - |
Affected
| ||||||
Ssh Search vendor "Ssh" | Ssh Search vendor "Ssh" for product "Ssh" | 1.2.31 Search vendor "Ssh" for product "Ssh" and version "1.2.31" | - |
Affected
|