nuclei-templates/network/detection/dropbear-cbc-ciphers.yaml

33 lines
920 B
YAML
Raw Normal View History

2022-11-22 18:28:08 +00:00
id: dropbear-cbc-ciphers
info:
name: Dropbear sshd CBC Mode Ciphers Detection
author: pussycat0x
severity: low
description: |
The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext.
2022-11-23 07:02:38 +00:00
reference: |
https://www.tenable.com/plugins/nessus/70658
remediation: |
Disable CBC Ciphers.
2022-11-22 18:28:08 +00:00
metadata:
max-request: 1
shodan-query: product:"Dropbear sshd"
2022-11-22 18:28:08 +00:00
verified: true
2023-07-24 18:27:05 +00:00
tags: network,ssh,dropbear,detect
2022-11-22 18:28:08 +00:00
tcp:
2022-11-22 18:28:08 +00:00
- inputs:
- data: "\n"
2022-11-24 18:35:59 +00:00
2022-11-22 18:28:08 +00:00
host:
- "{{Hostname}}"
2023-09-16 19:35:21 +00:00
port: 22
2022-11-24 18:35:59 +00:00
2022-11-22 18:28:08 +00:00
matchers:
- type: word
words:
- "cbc"
2022-12-02 11:49:56 +00:00
- "SSH-"
2022-12-02 11:50:59 +00:00
condition: and
# digest: 4a0a00473045022002fae16b256b4653ad2b98f85511cd26f00c12b388af06a773784c5a84485c17022100e96053936cf02101d8c3295bc5c5797df04c9fc0e666e5fda59f09208ff75826:922c64590222798bb761d5b6d8e72950