Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2018-15473
Severity
5.3MEDIUM
EPSS
90.4%
top 0.40%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 17
Latest updateMay 13
Description
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages12 packages
Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 18.04
Patches
🔴Vulnerability Details
5💥Exploits & PoCs
5📋Vendor Advisories
4💬Community
4Bugzilla▶
CVE-2018-15919 openssh: User enumeration via malformed packets in authentication requests↗2018-08-28
Bugzilla▶
CVE-2018-15599 dropbear: User enumeration via malformed packets in authentication requests↗2018-08-28
Bugzilla▶
CVE-2018-15473 openssh: User enumeration via malformed packets in authentication requests [fedora-all]↗2018-08-20
Bugzilla▶
CVE-2018-15473 openssh: User enumeration via malformed packets in authentication requests↗2018-08-20