vendor:
Unknown
by:
0_o -- null_null
5,9
CVSS
MEDIUM
User Name Enumeration
200
CWE
Product Name: Unknown
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2016-6210
CPE: Unknown
Metasploit:
https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/openbsd-openssh-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/aix-6.1-openssh_advisory9_cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/aix-5.3-openssh_advisory9_cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/aix-7.1-openssh_advisory9_cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/aix-7.2-openssh_advisory9_cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-6210/, https://www.rapid7.com/db/vulnerabilities/panos-cve-2016-6210/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Mac, Windows
2016
User Name Enumeration Against SSH Daemons Affected by CVE-2016-6210
This exploit is used to enumerate user names against SSH daemons affected by CVE-2016-6210. It uses a paramiko library to send a large number of bytes to the SSH daemon as a password and collects samples to calculate a timing baseline for authenticating non-existing users. If the authentication time for a user is 3 times the baseline, it is assumed to exist.
Mitigation:
Ensure that SSH daemons are updated to the latest version and that user authentication is done using strong passwords.