5.9
CVSSv3

CVE-2016-6210

Published: 13/02/2017 Updated: 13/12/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 442
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

sshd in OpenSSH prior to 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote malicious users to enumerate users by leveraging the timing difference between responses when a large password is provided.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh

Vendor Advisories

Several security issues were fixed in OpenSSH ...
Debian Bug report logs - #831902 openssh: CVE-2016-6210: User enumeration via covert timing channel Package: src:openssh; Maintainer for src:openssh is Debian OpenSSH Maintainers <debian-ssh@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 20 Jul 2016 17:27:01 UTC Severity: importan ...
Eddie Harari reported that the OpenSSH SSH daemon allows user enumeration through timing differences when trying to authenticate users When sshd tries to authenticate a non-existing user, it will pick up a fixed fake password structure with a hash based on the Blowfish algorithm If real users passwords are hashed using SHA256/SHA512, then a remot ...
A covert timing channel flaw was found in the way OpenSSH handled authentication of non-existent users A remote unauthenticated attacker could possibly use this flaw to determine valid user names by measuring the timing of server responses (CVE-2016-6210) It was found that OpenSSH did not limit password lengths for password authentication A remo ...
A covert timing channel flaw was found in the way OpenSSH handled authentication of non-existent users A remote unauthenticated attacker could possibly use this flaw to determine valid user names by measuring the timing of server responses ...

Exploits

#!/usr/bin/python # # CVEs: CVE-2016-6210 (Credits for this go to Eddie Harari) # # Author: 0_o -- null_null # nu11nu11 [at] yahoocom # Oh, and it is n-u-one-onen-u-one-one, no l's # Wonder how the guys at packet storm could get this wrong :( ...
Source: seclistsorg/fulldisclosure/2016/Jul/51 -------------------------------------------------------------------- User Enumeration using Open SSHD (<=Latest version) ------------------------------------------------------------------- Abstract: ----------- By sending large passwords, a remote user can enumerate users on system that r ...
OpenSSHD versions 72p2 and below remote username enumeration exploit ...
OpenSSHD versions 72p2 and below user enumeration exploit ...

Github Repositories

CVE 2016-6210 OpenSSH 7.2p2 Time response vulnerability to enumerate usernames

CVE2016-6210 CVE 2016-6210 OpenSSH 72p2 Time response vulnerability to enumerate usernames Description A covert timing channel flaw was found in the way OpenSSH handled authentication of non-existent users A remote unauthenticated attacker could possibly use this flaw to determine valid user names by measuring the timing of server responses This tool was created to take adva

SSH-ULTIMATE EXPLOIT

SSH-ULTIMATE SSH-ULTIMATE EXPLOIT Infos SSH-ULTMATE EXPLOIT | CVE | Exploit Type | Requirements | | ------------- | --------------- | -------------- | | CVE-2016-6210 | REMOTLY | requiremttxt | | | | | | | | | SSH-ENUMERATION

Custom exploit written for enumerating usernames as per CVE-2016-6210

CVE-2016-6210-exploit Custom exploit written for enumerating usernames as per CVE-2016-6210 (OpenSSH 72-p2 & prior) ONLY USE THIS CODE ON SYSTEMS IN WHICH YOU ARE AUTHORISED TO DO THIS ON DESCRIPTION I wrote this program as a tool to exploit CVE-2016-6210, which is a vulnerability in OpenSSH (before version 73) disclosed by Eddie Harari From what I understand, the pro

OpenSSHD 7.2p2 - User Enumeration: CVE 2016-6210

OpenSSHD User Enumeration A simple script that takes advantage of OpenSSHD 72p2 - User Enumeration: CVE 2016-6210 Can take a list of usernames and try them against a server -- looks to find users in the system Built from the sample code specified at wwwexploit-dbcom/exploits/40113/ Usage python opensshdpy [-h] [-u --userlist USERLIST_FILE] target_ip Results [att

Attempts to leverage CVE 2016-6210 to enumerate valid users on a given OpenSSH server. All credit to Eddie Harari on the list for disclosure and initial PoC - I'm just making it work in cases where you have a bunch (dozens/hundreds) of servers to test ASAP.

OpenSSH-User-Enumeration Attempts to leverage CVE 2016-6210 to enumerate valid users on a given OpenSSH server All credit to Eddie Harari on the list for disclosure and initial PoC - I'm just making it work in cases where you have a bunch (dozens/hundreds) of servers to test ASAP Inputs: userstxt, IPv4_targetstxt Output: outputtxt

OpenSSH Username Enumeration - CVE-2016-6210

This is the first version of the "weaponized" exploit for CVE-2016-6210 Background: Posted by Eddie Harari on Full Disclosure seclistsorg/fulldisclosure/2016/Jul/51 The brief: By sending large passwords, a remote user can enumerate users on system that runs SSHD This problem exists in most modern configuration due to the fact that it takes much longer to cal