// For flags

CVE-2018-15599

 

Severity Score

5.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.

La función recv_msg_userauth_request en svr-auth.c en Dropbear hasta la versión 2018.76 es propensa a una vulnerabilidad de enumeración de usuarios porque la validez de los nombres de usuarios afecta a cómo se manejan los campos en los mensajes SSH_MSG_USERAUTH. Este problema es similar a CVE-2018-15473 en una base de código no relacionada.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-08-20 CVE Reserved
  • 2018-08-21 CVE Published
  • 2024-03-16 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Dropbear Ssh Project
Search vendor "Dropbear Ssh Project"
Dropbear Ssh
Search vendor "Dropbear Ssh Project" for product "Dropbear Ssh"
<= 2018.76
Search vendor "Dropbear Ssh Project" for product "Dropbear Ssh" and version " <= 2018.76"
-
Affected