CVE-2012-5975
SSH Tectia Server - Authentication Bypass
Title source: ruleDescription
The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
Exploits (3)
metasploit
WORKING POC
EXCELLENT
by kingcope, bperry, sinn3r · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/ssh/tectia_passwd_changereq.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/23156
References (4)
Scores
EPSS
0.2575
EPSS Percentile
96.1%
Classification
CWE
CWE-287
Status
draft
Affected Products (35)
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
ssh/tectia_server
... and 20 more
Timeline
Published
Dec 04, 2012
Tracked Since
Feb 18, 2026