Royal TS before 5 has a 0.0.0.0 listener, which makes it easier for attackers to bypass tunnel authentication via a brute-force approach.
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2020/Jun/14 | third party advisory mailing list |
https://hacktips.it/royalts-ssh-tunnel-authentication-bypass/ | exploit |
http://packetstormsecurity.com/files/158000/RoyalTS-SSH-Tunnel-Authentication-Bypass.html | third party advisory vdb entry exploit |