CVE-2023-38408

CWE-428CWE-94Code Injection16 documents13 sources
Severity
9.8CRITICAL
EPSS
64.4%
top 1.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 20
Latest updateOct 15

Description

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDopenbsd/openssh< 9.3+1
Debianopenssh< 1:8.4p1-5+deb11u2+3

Also affects: Fedora 37, 38

Patches

🔴Vulnerability Details

4
OSV
CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 92023-07-20
GHSA
GHSA-px36-p9hv-7h2v: The PKCS#11 feature in ssh-agent in OpenSSH before 92023-07-20
CVEList
CVE-2023-38408: The PKCS#11 feature in ssh-agent in OpenSSH before 92023-07-20
VulnCheck
OpenBSD openssh Unquoted Search Path or Element2023

📋Vendor Advisories

9
Oracle
Oracle Oracle Communications Risk Matrix: System (OpenSSH) — CVE-2023-384082024-10-15
Oracle
Oracle Oracle Communications Risk Matrix: Install/Upgrade (OpenSSH) — CVE-2023-384082023-10-15
Apple
CVE-2023-38408: macOS Sonoma 142023-09-26
BSD
FreeBSD-SA-23:08.ssh: Potential remote code execution via ssh-agent forwarding2023-08-01
Ubuntu
OpenSSH vulnerability2023-07-31

🕵️Threat Intelligence

1
Qualys
CVE-2023-38408 OpenSSH Exploit & Vulnerability Details | Qualys2023-07-19
CVE-2023-38408 (CRITICAL CVSS 9.8) | The PKCS#11 feature in ssh-agent in | cvebase.io