// For flags

CVE-2018-15473

OpenSSH < 7.7 - User Enumeration

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

42
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.

OpenSSH hasta la versión 7.7 es propenso a una vulnerabilidad de enumeración de usuarios debido a que no retrasa el rescate de un usuario de autenticación no válido hasta que el paquete que contiene la petición haya sido analizado completamente. Esto está relacionado con auth2-gss.c, auth2-hostbased.c, y auth2-pubkey.c.

A user enumeration vulnerability flaw was found in OpenSSH, though version 7.7. The vulnerability occurs by not delaying bailout for an invalid authenticated user until after the packet containing the request has been fully parsed. The highest threat from this vulnerability is to data confidentiality.

USN-3809-1 fixed vulnerabilities in OpenSSH. The update for CVE-2018-15473 was incomplete and could introduce a regression in certain environments. This update fixes the problem. Robert Swiecki discovered that OpenSSH incorrectly handled certain messages. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. It was discovered that OpenSSH incorrectly handled certain requests. An attacker could possibly use this issue to access sensitive information. Various other issues were also addressed.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-08-17 CVE Reserved
  • 2018-08-17 CVE Published
  • 2018-09-13 First Exploit
  • 2024-08-05 CVE Updated
  • 2025-05-04 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (61)
URL Date SRC
https://packetstorm.news/files/id/181223 2024-09-01
https://packetstorm.news/files/id/150621 2018-12-05
https://www.exploit-db.com/exploits/45939 2024-08-05
https://www.exploit-db.com/exploits/45233 2024-08-05
https://www.exploit-db.com/exploits/45210 2024-08-05
https://github.com/Rhynorater/CVE-2018-15473-Exploit 2018-09-13
https://github.com/r3dxpl0it/CVE-2018-15473 2018-10-27
https://github.com/Sait-Nuri/CVE-2018-15473 2020-11-29
https://github.com/LINYIKAI/CVE-2018-15473-exp 2019-01-23
https://github.com/MrDottt/CVE-2018-15473 2021-09-14
https://github.com/yZ1337/CVE-2018-15473 2024-06-17
https://github.com/1stPeak/CVE-2018-15473 2020-11-25
https://github.com/0xrobiul/CVE-2018-15473 2022-09-03
https://github.com/4xolotl/CVE-2018-15473 2023-10-31
https://github.com/philippedixon/CVE-2018-15473 2023-01-01
https://github.com/GaboLC98/userenum-CVE-2018-15473 2023-05-15
https://github.com/66quentin/shodan-CVE-2018-15473 2021-12-11
https://github.com/Dirty-Racoon/CVE-2018-15473-py3 2020-11-27
https://github.com/sergiovks/SSH-User-Enum-Python3-CVE-2018-15473 2023-03-12
https://github.com/MahdiOsman/CVE-2018-15473-SNMPv1-2-Community-String-Vulnerability-Testing 2024-08-15
https://github.com/trimstray/massh-enum 2024-10-11
https://github.com/gbonacini/opensshenum 2022-02-27
https://github.com/epi052/cve-2018-15473 2024-11-16
https://github.com/pyperanger/CVE-2018-15473_exploit 2022-11-09
https://github.com/JoeBlackSecurity/SSHUsernameBruter-SSHUB 2020-04-23
https://github.com/cved-sources/cve-2018-15473 2023-02-21
https://github.com/trickster1103/- 2019-06-19
https://github.com/NHPT/SSH-account-enumeration-verification-script 2024-08-12
https://github.com/CaioCGH/EP4-redes 2019-11-01
https://github.com/Moon1705/easy_security 2020-05-08
https://github.com/An0nYm0u5101/enumpossible 2023-01-18
https://github.com/Wh1t3Fox/cve-2018-15473 2020-09-10
https://github.com/coollce/CVE-2018-15473_burte 2020-11-26
https://github.com/WildfootW/CVE-2018-15473_OpenSSH_7.7 2020-12-09
https://github.com/Anonimo501/ssh_enum_users_CVE-2018-15473 2023-04-21
https://github.com/mclbn/docker-cve-2018-15473 2024-07-12
https://github.com/NestyF/SSH_Enum_CVE-2018-15473 2024-11-13
https://github.com/SUDORM0X/PoC-CVE-2018-15473 2024-11-20
https://github.com/OmarV4066/SSHEnumKL 2025-02-09
https://github.com/moften/cve-2018-15473-poc 2025-03-25
https://github.com/0xNehru/ssh_Enum_vaild 2025-03-26
https://github.com/yZeetje/CVE-2018-15473 2024-06-17
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netapp
Search vendor "Netapp"
Cn1610 Firmware
Search vendor "Netapp" for product "Cn1610 Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
Cn1610
Search vendor "Netapp" for product "Cn1610"
--
Safe
Netapp
Search vendor "Netapp"
Vasa Provider
Search vendor "Netapp" for product "Vasa Provider"
>= 7.2
Search vendor "Netapp" for product "Vasa Provider" and version " >= 7.2"
-
Affected
in Netapp
Search vendor "Netapp"
Clustered Data Ontap
Search vendor "Netapp" for product "Clustered Data Ontap"
--
Safe
Netapp
Search vendor "Netapp"
Storage Replication Adapter
Search vendor "Netapp" for product "Storage Replication Adapter"
>= 7.2
Search vendor "Netapp" for product "Storage Replication Adapter" and version " >= 7.2"
vsphere
Affected
in Netapp
Search vendor "Netapp"
Clustered Data Ontap
Search vendor "Netapp" for product "Clustered Data Ontap"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X204rna Firmware
Search vendor "Siemens" for product "Scalance X204rna Firmware"
< 3.2.7
Search vendor "Siemens" for product "Scalance X204rna Firmware" and version " < 3.2.7"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance X204rna
Search vendor "Siemens" for product "Scalance X204rna"
--
Safe
Openbsd
Search vendor "Openbsd"
Openssh
Search vendor "Openbsd" for product "Openssh"
<= 7.7
Search vendor "Openbsd" for product "Openssh" and version " <= 7.7"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
6.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
7.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server
Search vendor "Redhat" for product "Enterprise Linux Server"
6.0
Search vendor "Redhat" for product "Enterprise Linux Server" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server
Search vendor "Redhat" for product "Enterprise Linux Server"
7.0
Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation
Search vendor "Redhat" for product "Enterprise Linux Workstation"
6.0
Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation
Search vendor "Redhat" for product "Enterprise Linux Workstation"
7.0
Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "7.0"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
16.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
18.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04"
lts
Affected
Netapp
Search vendor "Netapp"
Aff Baseboard Management Controller
Search vendor "Netapp" for product "Aff Baseboard Management Controller"
--
Affected
Netapp
Search vendor "Netapp"
Cloud Backup
Search vendor "Netapp" for product "Cloud Backup"
--
Affected
Netapp
Search vendor "Netapp"
Data Ontap Edge
Search vendor "Netapp" for product "Data Ontap Edge"
--
Affected
Netapp
Search vendor "Netapp"
Fas Baseboard Management Controller
Search vendor "Netapp" for product "Fas Baseboard Management Controller"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Unified Manager
Search vendor "Netapp" for product "Oncommand Unified Manager"
>= 9.4
Search vendor "Netapp" for product "Oncommand Unified Manager" and version " >= 9.4"
vsphere
Affected
Netapp
Search vendor "Netapp"
Ontap Select Deploy
Search vendor "Netapp" for product "Ontap Select Deploy"
--
Affected
Netapp
Search vendor "Netapp"
Service Processor
Search vendor "Netapp" for product "Service Processor"
--
Affected
Netapp
Search vendor "Netapp"
Steelstore Cloud Integrated Storage
Search vendor "Netapp" for product "Steelstore Cloud Integrated Storage"
--
Affected
Netapp
Search vendor "Netapp"
Virtual Storage Console
Search vendor "Netapp" for product "Virtual Storage Console"
>= 7.2
Search vendor "Netapp" for product "Virtual Storage Console" and version " >= 7.2"
vsphere
Affected
Netapp
Search vendor "Netapp"
Clustered Data Ontap
Search vendor "Netapp" for product "Clustered Data Ontap"
--
Affected
Netapp
Search vendor "Netapp"
Data Ontap
Search vendor "Netapp" for product "Data Ontap"
-7-mode
Affected
Oracle
Search vendor "Oracle"
Sun Zfs Storage Appliance Kit
Search vendor "Oracle" for product "Sun Zfs Storage Appliance Kit"
8.8.6
Search vendor "Oracle" for product "Sun Zfs Storage Appliance Kit" and version "8.8.6"
-
Affected