CVE-2017-5544

An issue was discovered on FiberHome Fengine S5800 switches V210R240. An unauthorized attacker can access the device's SSH service, using a password cracking tool to establish SSH connections quickly. This will trigger an increase in the SSH login timeout (each of the login attempts will occupy a connection slot for a longer time). Once this occurs, legitimate login attempts via SSH/telnet will be refused, resulting in a denial of service; you must restart the device.
References
Link Resource
http://www.nfcwar.com URL Repurposed
http://www.securityfocus.com/bid/95708 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:fiberhome:fengine_s5800_firmware:v210r240:*:*:*:*:*:*:*
OR cpe:2.3:h:fiberhome:fengine_s5800-28t-s-pe:-:*:*:*:*:*:*:*
cpe:2.3:h:fiberhome:fengine_s5800-28t-s:-:*:*:*:*:*:*:*
cpe:2.3:h:fiberhome:fengine_52t-s:-:*:*:*:*:*:*:*
cpe:2.3:h:fiberhome:fengine_28f-s:-:*:*:*:*:*:*:*
cpe:2.3:h:fiberhome:fengine_52f-s:-:*:*:*:*:*:*:*

Information

Published : 2017-01-22 23:59

Updated : 2021-09-08 18:23


NVD link : CVE-2017-5544

Mitre link : CVE-2017-5544


JSON object : View

CWE
CWE-400

Uncontrolled Resource Consumption

Advertisement

dedicated server usa

Products Affected

fiberhome

  • fengine_s5800_firmware
  • fengine_s5800-28t-s-pe
  • fengine_52f-s
  • fengine_28f-s
  • fengine_s5800-28t-s
  • fengine_52t-s