Vulnerability Description
OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbsd | Openssh | <= 8.7 |
| Netapp | Clustered Data Ontap | - |
| Netapp | Hci Management Node | - |
| Netapp | Ontap Select Deploy Administration Utility | - |
| Netapp | Solidfire | - |
References
- https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbExploitThird Party Advisory
- https://github.com/openssh/openssh-portable/pull/270PatchThird Party Advisory
- https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097Issue TrackingThird Party Advisory
- https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185Issue TrackingThird Party Advisory
- https://rushter.com/blog/public-ssh-keys/ExploitThird Party Advisory
- https://security.netapp.com/advisory/ntap-20211014-0005/Third Party Advisory
- https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeakThird Party Advisory
- https://www.openwall.com/lists/oss-security/2018/08/24/1Mailing ListThird Party Advisory
- https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbExploitThird Party Advisory
- https://github.com/openssh/openssh-portable/pull/270PatchThird Party Advisory
- https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097Issue TrackingThird Party Advisory
- https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185Issue TrackingThird Party Advisory
- https://rushter.com/blog/public-ssh-keys/ExploitThird Party Advisory
- https://security.netapp.com/advisory/ntap-20211014-0005/Third Party Advisory
- https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeakThird Party Advisory
FAQ
What is CVE-2016-20012?
CVE-2016-20012 is a vulnerability with a CVSS score of 5.3 (MEDIUM). OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occur...
How severe is CVE-2016-20012?
CVE-2016-20012 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-20012?
Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openssh, Netapp Clustered Data Ontap, Netapp Hci Management Node, Netapp Ontap Select Deploy Administration Utility, Netapp Solidfire.