cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
118
Views
0
Helpful
1
Replies

Tenable.io - SSH cipher negotiation failure with Cisco IOS devices

DRXEON
Level 1
Level 1

Nessus Scanner:
Tenable.io–managed Nessus Scanner v10.11.1

Cisco Switch Model:
WS-C3650-48TQ

Cisco IOS XE Version:
16.12.12


Issue Description

We are attempting to perform a credentialed SSH scan against Cisco switches using a Nessus scanner.
The SSH connection initiated by Nessus fails during SSH negotiation (pre-authentication).

The following messages are logged on the Cisco switch during the scan attempt:

 

 
%SSH-3-PACK_PADD_ERR: Padding error: needed 0 bytes, block size 25 bytes, mod= 8
%SSH-4-SSH2_UNEXPECTED_MSG: Unexpected message type has arrived. Terminating the connection from <scanner IP>

As a result, Nessus is unable to complete authenticated SSH checks.


Validation Performed

  • SSH access from the same Nessus scanner VM using OpenSSH works successfully

  • The same account and credentials authenticate without issue

  • SSH negotiation succeeds using:

    • ecdh-sha2-nistp256

    • aes256-ctr

    • hmac-sha2-256

  • This confirms:

    • Network connectivity is intact

    • Credentials are valid

    • Cisco SSH configuration is functioning as expected


Question / Request

This appears to be a client-side SSH negotiation issue specific to the Nessus embedded SSH client.

  • Is this a known limitation or defect when scanning Cisco IOS XE 16.12.x devices?

  • Are there any recommended scanner settings, updates, or scan templates to improve SSH compatibility?

  • From the Cisco perspective, are these SSH errors expected when a client fails negotiation, or is there additional tuning recommended?

1 Reply 1

DRXEON
Level 1
Level 1

The issue is resolved now with setting the correct credential type in Tenable.io (you have to choose SSH)