⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2019-6110Inappropriate Encoding for Output Context in Openssh

Severity
6.8MEDIUMNVD
EPSS
57.6%
top 1.83%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJan 31
Latest updateApr 5

Description

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 1.6 | Impact: 5.2

Affected Packages5 packages

Patches

🔴Vulnerability Details

4
GHSA
GHSA-mv2j-4mm8-9xgv: In OpenSSH 72022-05-13
OSV
CVE-2019-6110: In OpenSSH 72019-01-31
CVEList
CVE-2019-6110: In OpenSSH 72019-01-31
VulnCheck
OpenBSD openssh Inappropriate Encoding for Output Context2019

💥Exploits & PoCs

2
Exploit-DB
SCP Client - Multiple Vulnerabilities (SSHtranger Things)2019-01-18
Exploit-DB
OpenSSH SCP Client - Write Arbitrary Files2019-01-11

📋Vendor Advisories

3
Palo Alto
PAN-SA-2024-0003 Informational Bulletin: Impact of OSS CVEs in Prisma SD-WAN ION2024-04-05
Debian
CVE-2019-6110: openssh - In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the...2019
Red Hat
openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output2018-11-16

💬Community

2
Bugzilla
CVE-2019-6110 openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output [fedora-all]2019-01-15
Bugzilla
CVE-2019-6110 openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output2019-01-15
CVE-2019-6110 — Openbsd Openssh vulnerability | cvebase