Описание
The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote attackers to downgrade authentication and encryption mechanisms via a man-in-the-middle attack.
Ссылки
- Exploit
- Third Party AdvisoryUS Government Resource
- Exploit
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:kth:kth_kerberos:4:*:*:*:*:*:*:*
cpe:2.3:a:kth:kth_kerberos:5:*:*:*:*:*:*:*
EPSS
Процентиль: 71%
0.00679
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote attackers to downgrade authentication and encryption mechanisms via a man-in-the-middle attack.
EPSS
Процентиль: 71%
0.00679
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other