User Enumeration Vulnerability in OpenSSH by The OpenBSD Foundation
CVE-2016-6210
Key Information:
Badges
Summary
In OpenSSH versions prior to 7.3, an exposure exists where the password hashing mechanism, utilizing SHA256 or SHA512, falls back to BLOWFISH hashing when attempting to authenticate a non-existent username. This flaw creates a timing discrepancy in the responses to authentication requests, potentially enabling remote attackers to enumerate valid usernames based on the observed timing of responses when large passwords are input. Such an exploit can facilitate further intrusion attempts against targeted systems.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
92% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved