CVE-2018-7750

high-risk
Published 2018-03-13

transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.

Do I need to act?

!
13.8% chance of exploitation in next 30 days
EPSS score — higher than 86% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
+
Fix available
Upgrade to: ac3f78648d2f48c3a99bbf0295245954a34ab46d, 3a50a3eb09168343af2d06ff7f269d2493af4e0b, 30452567c69096ad4aabd159ed3f3ad1ef83ab47, e62f35a71bcc90447f3eee6f5b48f174a7bfb83e, 04f0d9fc74f6219d2932252b6ba7d835bb4914ef, c07b6e6b8b94fe8a946a8120c1d1b4039c1fe4f0, fa29bd8446c8eab237f5187d28787727b4610516
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Vendors

63
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 12/34 · Low
Exposure 19/34 · Moderate