CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.7 | $0-$5k | 0.00 |
A vulnerability was found in Dropbear up to 2020.81 (SSH Server Software). It has been classified as critical. Affected is an unknown code of the component Non-RFC-compliant Check. The manipulation with an unknown input leads to a improper authentication vulnerability. CWE is classifying the issue as CWE-287. When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.
The weakness was disclosed 10/13/2022. The advisory is shared for download at github.com. This vulnerability is traded as CVE-2021-36369 since 07/09/2021. There are neither technical details nor an exploit publicly available.
Upgrading to version 2022.82 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be patching the affected component.
Product
Type
Name
Version
- 2020.0
- 2020.1
- 2020.2
- 2020.3
- 2020.4
- 2020.5
- 2020.6
- 2020.7
- 2020.8
- 2020.9
- 2020.10
- 2020.11
- 2020.12
- 2020.13
- 2020.14
- 2020.15
- 2020.16
- 2020.17
- 2020.18
- 2020.19
- 2020.20
- 2020.21
- 2020.22
- 2020.23
- 2020.24
- 2020.25
- 2020.26
- 2020.27
- 2020.28
- 2020.29
- 2020.30
- 2020.31
- 2020.32
- 2020.33
- 2020.34
- 2020.35
- 2020.36
- 2020.37
- 2020.38
- 2020.39
- 2020.40
- 2020.41
- 2020.42
- 2020.43
- 2020.44
- 2020.45
- 2020.46
- 2020.47
- 2020.48
- 2020.49
- 2020.50
- 2020.51
- 2020.52
- 2020.53
- 2020.54
- 2020.55
- 2020.56
- 2020.57
- 2020.58
- 2020.59
- 2020.60
- 2020.61
- 2020.62
- 2020.63
- 2020.64
- 2020.65
- 2020.66
- 2020.67
- 2020.68
- 2020.69
- 2020.70
- 2020.71
- 2020.72
- 2020.73
- 2020.74
- 2020.75
- 2020.76
- 2020.77
- 2020.78
- 2020.79
- 2020.80
- 2020.81
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.9VulDB Meta Temp Score: 6.7
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Improper authenticationCWE: CWE-287
ATT&CK: Unknown
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Upgrade: Dropbear 2022.82
Patch: github.com
Timeline
07/09/2021 🔍10/13/2022 🔍
10/13/2022 🔍
11/07/2022 🔍
Sources
Advisory: github.comStatus: Confirmed
CVE: CVE-2021-36369 (🔍)
Entry
Created: 10/13/2022 12:11Updated: 11/07/2022 11:12
Changes: 10/13/2022 12:11 (42), 11/07/2022 11:12 (11)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.