Vulnerability identifier: #VU11130
Vulnerability risk: Low
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID:
CWE-ID:
CWE-592
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Paramiko
Client/Desktop applications /
Encryption software
Vendor: Jeff Forcier
Description
The vulnerability allows a remote unauthenticated attacker to bypass authentication.
The weakness exists is due to improper security restrictions. A remote attacker can use a customized SSH client, bypass authentication and gain unauthorized access to resources on the target systemю
Mitigation
Update to versions 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5 or 1.17.6.
Vulnerable software versions
Paramiko: 1.17 - 2.4.0
External links
https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.