MEDIUM · 6.8

CVE-2019-6110

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI co...

Vulnerability Description

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

CVSS Score

6.8

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
OpenbsdOpenssh<= 7.9
WinscpWinscp<= 5.13
NetappElement Software-
NetappOntap Select Deploy-
NetappStorage Automation Store-
SiemensScalance X204Rna Firmware< 3.2.7
SiemensScalance X204Rna-
SiemensScalance X204Rna Eec Firmware< 3.2.7
SiemensScalance X204Rna Eec-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-6110?

CVE-2019-6110 is a vulnerability with a CVSS score of 6.8 (MEDIUM). In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI co...

How severe is CVE-2019-6110?

CVE-2019-6110 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-6110?

Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openssh, Winscp Winscp, Netapp Element Software, Netapp Ontap Select Deploy, Netapp Storage Automation Store.