First published: Tue Jun 06 2017(Updated: )
The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions. As a result, it falls back to allowing ALL algorithms supported by the relevant version of OpenSSH and makes the installations vulnerable to a range of MITM, downgrade, and decryption attacks.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Rapid7 Nexpose | <=6.4.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5243 is considered a medium severity vulnerability due to its potential exploitation via insecure algorithms.
To fix CVE-2017-5243, update your Rapid7 Nexpose appliance to a version later than June 2017, ensuring secure algorithms are specified.
The risks associated with CVE-2017-5243 include unauthorized access and potential data breaches due to weak SSH configurations.
CVE-2017-5243 affects Rapid7 Nexpose versions up to and including 6.4.40.
A temporary workaround for CVE-2017-5243 is to manually configure the SSH settings to enforce stronger key exchange algorithms.