Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


Prevent ASA 5505 SSH server from revealing version number

Posted on 2012-09-07
Medium Priority
Last Modified: 2013-03-01

Can anyone please advise if it is possilble to modify/restrict the advertised SSH version information when connecting to an ASA 5505 (with an IPS module).  The purpose of this is to prevent a potential attacker taking advantage of identifying the version of SSH and then launcing a targeted exploit.
The ASA does restrict the source IP range of where SSH connections can originate from.

The ASA is running version 8.4 code.


Question by:PhilMacavity
1 Comment
LVL 18

Accepted Solution

max_the_king earned 1000 total points
ID: 38376625
I believe you cannot change the advertised version, but cisco asa have increased security on ssh, as it is stated in 8.4 release notes:

"Increased SSH security; the SSH default username is no longer supported—Starting in 8.4(2), you can no longer connect to the ASA using SSH with the pix or asa username and the login password. To use SSH, you must configure AAA authentication using the aaa authentication ssh console LOCAL command (CLI) or Configuration > Device Management > Users/AAA > AAA Access > Authentication (ASDM); then define a local user by entering the username command (CLI) or choosing Configuration > Device Management > Users/AAA > User Accounts (ASDM). If you want to use a AAA server for authentication instead of the local database, we recommend also configuring local authentication as a backup method."

Basically this means that attacker won't be able to exploit an attack by trying password of the previous default user (e.g. "pix"), but has got to guess what user account you have configured (try avoiding the usual "Administrator", "admin" and the like).
Besides, as you have written, you can as well limit the range of outside sources allowed to connect by configuring the ssh command (i.e.: ssh outside).

hope this helps

Featured Post

IT Degree with Certifications Included

Aspire to become a network administrator, network security analyst, or computer and information systems manager? Make the most of your experience as an IT professional by earning your B.S. in Network Operations and Security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we’ll look at how to deploy ProxySQL.
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question