CVE-2016-20012

Severity
5.3MEDIUM
EPSS
14.6%
top 5.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 15
Latest updateMay 24

Description

OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages1 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-84j4-ccmw-hwpg: OpenSSH through 82022-05-24
CVEList
CVE-2016-20012: OpenSSH through 82021-09-15
OSV
CVE-2016-20012: OpenSSH through 82021-09-15

📋Vendor Advisories

3
Microsoft
OpenSSH through 8.7 allows remote attackers who have a suspicion that a certain combination of username and public key is known to an SSH server to test whether this suspicion is correct. This occurs 2021-09-14
Red Hat
openssh: Public key information leak2016-02-07
Debian
CVE-2016-20012: openssh - OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain...2016
CVE-2016-20012 (MEDIUM CVSS 5.3) | OpenSSH through 8.7 allows remote a | cvebase.io