Vulnerability Description
When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mobatek | Mobaxterm | <= 22.2 |
Related Weaknesses (CWE)
References
- https://docs.ssh-mitm.at/vulnerabilities/CVE-2022-38337.htmlThird Party Advisory
- https://mobaxterm.mobatek.net/download-home-edition.htmlPatchRelease NotesVendor Advisory
- https://docs.ssh-mitm.at/vulnerabilities/CVE-2022-38337.htmlThird Party Advisory
- https://mobaxterm.mobatek.net/download-home-edition.htmlPatchRelease NotesVendor Advisory
FAQ
What is CVE-2022-38337?
CVE-2022-38337 is a vulnerability with a CVSS score of 9.1 (CRITICAL). When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for t...
How severe is CVE-2022-38337?
CVE-2022-38337 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-38337?
Check the references section above for vendor advisories and patch information. Affected products include: Mobatek Mobaxterm.