vendor:
Paramiko SSH
by:
N/A
5.5
CVSS
MEDIUM
Insecure Default Configuration
287
CWE
Product Name: Paramiko SSH
Affected Version From: 2.0.8
Affected Version To: 2.7.1
Patch Exists: YES
Related CWE: CVE-2020-14150
CPE: N/A
Other Scripts:
N/A
Platforms Tested: Python
2020
Paramiko SSH Insecure Default Configuration Vulnerability
Paramiko is a Python implementation of the SSHv2 protocol, providing both client and server functionality. Paramiko is vulnerable to an insecure default configuration vulnerability, which allows an attacker to connect to the SSH server without authentication. This vulnerability is due to the Paramiko library not enforcing authentication by default. An attacker can exploit this vulnerability by connecting to the SSH server without authentication and executing arbitrary commands.
Mitigation:
Ensure that authentication is enforced on the SSH server by setting the 'require_authentication' parameter to 'True' in the Paramiko configuration.