// For flags

CVE-2018-10933

libssh Authentication Bypass Scanner

Severity Score

9.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

42
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.

Se ha detectado una vulnerabilidad en la máquina de estado del lado del servidor de libssh en versiones anteriores a la 0.7.6 y 0.8.4. Un cliente malicioso podría crear canales sin realizar antes la autenticación, lo que resulta en un acceso no autorizado.

Peter Winter-Smith of NCC Group discovered that libssh, a tiny C SSH library, contains an authentication bypass vulnerability in the server code. An attacker can take advantage of this flaw to successfully authenticate without any credentials by presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication. For the stable distribution (stretch), this problem has been fixed in version 0.7.3-2+deb9u1.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-05-09 CVE Reserved
  • 2018-10-17 CVE Published
  • 2018-10-17 First Exploit
  • 2024-08-05 CVE Updated
  • 2025-07-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-287: Improper Authentication
  • CWE-592: DEPRECATED: Authentication Bypass Issues
CAPEC
References (52)
URL Date SRC
https://packetstorm.news/files/id/181227 2024-09-01
https://packetstorm.news/files/id/151477 2019-02-03
https://packetstorm.news/files/id/149865 2018-10-19
https://www.exploit-db.com/exploits/46307 2019-02-03
https://www.exploit-db.com/exploits/45638 2024-08-05
https://github.com/blacknbunny/CVE-2018-10933 2023-02-20
https://github.com/SoledaD208/CVE-2018-10933 2018-10-22
https://github.com/jas502n/CVE-2018-10933 2018-10-20
https://github.com/Virgula0/POC-CVE-2018-10933 2018-10-25
https://github.com/shifa123/pythonprojects-CVE-2018-10933 2018-10-21
https://github.com/kn6869610/CVE-2018-10933 2018-10-17
https://github.com/xFreed0m/CVE-2018-10933 2019-12-05
https://github.com/r3dxpl0it/CVE-2018-10933 2018-10-24
https://github.com/HSw109/CVE-2018-10933 2024-04-10
https://github.com/Bifrozt/CVE-2018-10933 2018-10-23
https://github.com/youkergav/CVE-2018-10933 2020-03-31
https://github.com/ensimag-security/CVE-2018-10933 2018-11-28
https://github.com/lalishasanduwara/CVE-2018-10933 2020-05-12
https://github.com/SilasSpringer/CVE-2018-10933 2022-12-01
https://github.com/hook-s3c/CVE-2018-10933 2018-10-17
https://github.com/Rubikcuv5/CVE-2018-10933 2022-07-28
https://github.com/kristyna-mlcakova/CVE-2018-10933 2020-04-19
https://github.com/sambiyal/CVE-2018-10933-POC 2018-11-21
https://github.com/throwawayaccount12312312/precompiled-CVE-2018-10933 2018-10-24
https://github.com/cyberharsh/Libssh-server-CVE-2018-10933 2020-06-20
https://github.com/crispy-peppers/Libssh-server-CVE-2018-10933 2019-11-23
https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass 2018-10-18
https://github.com/jobroche/libssh-scanner 2024-10-17
https://github.com/likekabin/CVE-2018-10933_ssh 2024-08-12
https://github.com/likekabin/CVE-2018-10933-libSSH-Authentication-Bypass 2018-10-18
https://github.com/marco-lancini/hunt-for-cve-2018-10933 2024-08-12
https://github.com/hackerhouse-opensource/cve-2018-10933 2024-09-26
https://github.com/cve-2018/cve-2018-10933 2018-10-23
https://github.com/ninp0/cve-2018-10933_poc 2018-10-22
https://github.com/pghook/CVE-2018-10933_Scanner 2020-05-15
https://github.com/ivanacostarubio/libssh-scanner 2019-02-24
https://github.com/reanimat0r/bpnd-libssh 2018-10-24
https://github.com/0xadaw/libSSH-bypass 2018-11-16
https://github.com/nikhil1232/LibSSH-Authentication-Bypass 2023-09-12
https://github.com/Kurlee/LibSSH-exploit 2019-02-10
https://github.com/JoSecMx/CVE-2018-10933_Scanner 2020-05-15
https://github.com/bidaoui4905/CVE-2018-10933 2025-07-07
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Libssh
Search vendor "Libssh"
Libssh
Search vendor "Libssh" for product "Libssh"
>= 0.6.0 < 0.7.6
Search vendor "Libssh" for product "Libssh" and version " >= 0.6.0 < 0.7.6"
-
Affected
Libssh
Search vendor "Libssh"
Libssh
Search vendor "Libssh" for product "Libssh"
>= 0.8.0 < 0.8.4
Search vendor "Libssh" for product "Libssh" and version " >= 0.8.0 < 0.8.4"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
16.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
18.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
18.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "18.10"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
7.0
Search vendor "Redhat" for product "Enterprise Linux" and version "7.0"
-
Affected
Netapp
Search vendor "Netapp"
Oncommand Unified Manager
Search vendor "Netapp" for product "Oncommand Unified Manager"
>= 7.3
Search vendor "Netapp" for product "Oncommand Unified Manager" and version " >= 7.3"
windows
Affected
Netapp
Search vendor "Netapp"
Oncommand Unified Manager
Search vendor "Netapp" for product "Oncommand Unified Manager"
>= 9.4
Search vendor "Netapp" for product "Oncommand Unified Manager" and version " >= 9.4"
vsphere
Affected
Netapp
Search vendor "Netapp"
Oncommand Workflow Automation
Search vendor "Netapp" for product "Oncommand Workflow Automation"
--
Affected
Netapp
Search vendor "Netapp"
Snapcenter
Search vendor "Netapp" for product "Snapcenter"
--
Affected
Netapp
Search vendor "Netapp"
Storage Automation Store
Search vendor "Netapp" for product "Storage Automation Store"
--
Affected
Oracle
Search vendor "Oracle"
Mysql Workbench
Search vendor "Oracle" for product "Mysql Workbench"
<= 8.0.13
Search vendor "Oracle" for product "Mysql Workbench" and version " <= 8.0.13"
-
Affected