6.5
CVSSv2

CVE-2018-1000805

Published: 08/10/2018 Updated: 06/04/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

paramiko paramiko 2.1.5

paramiko paramiko 1.18.5

paramiko paramiko 2.3.2

paramiko paramiko 2.2.3

paramiko paramiko 2.4.1

paramiko paramiko 2.0.8

paramiko paramiko 1.17.6

redhat enterprise linux desktop 6.0

redhat enterprise linux desktop 7.0

redhat enterprise linux server 6.0

redhat enterprise linux server 7.0

redhat enterprise linux server eus 6.7

redhat enterprise linux server eus 7.6

redhat enterprise linux server tus 6.6

redhat enterprise linux server tus 7.6

redhat virtualization host 4.0

redhat enterprise linux server aus 6.5

redhat enterprise linux server aus 7.6

redhat enterprise linux workstation 6.0

redhat ansible tower 3.3

redhat enterprise linux server aus 6.4

redhat enterprise linux server aus 6.6

redhat enterprise linux workstation 7.0

debian debian linux 8.0

debian debian linux 9.0

canonical ubuntu linux 16.04

canonical ubuntu linux 18.10

canonical ubuntu linux 12.04

canonical ubuntu linux 18.04

canonical ubuntu linux 14.04

Vendor Advisories

Debian Bug report logs - #910760 paramiko: CVE-2018-1000805: Authentication bypass in auth_handlerpy Package: src:paramiko; Maintainer for src:paramiko is Jeremy T Bouse <jbouse@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 10 Oct 2018 19:51:01 UTC Severity: important Tags: fixed-ups ...
Synopsis Critical: python-paramiko security update Type/Severity Security Advisory: Critical Topic An update for python-paramiko is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scoring System (CVSS ...
Synopsis Critical: Red Hat Ansible Tower 331-2 Release - Container Image Type/Severity Security Advisory: Critical Topic Security Advisory Description Red Hat Ansible Tower 331 is now available and contains the following bug fixes: Fixed event callback error when in-line vaulted variabl ...
Synopsis Critical: python-paramiko security update Type/Severity Security Advisory: Critical Topic An update for python-paramiko is now available for Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 64 Advanced Update Support, Red Hat Enterprise Linux 65 Advanced Update Support, Red Hat Enterprise Lin ...
Synopsis Moderate: Red Hat Virtualization security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7Red Hat Product Securi ...
Paramiko could allow unintended access to network services ...
Paramiko could allow unintended access to network services ...
Paramiko could allow unintended access to network services ...
Paramiko contains a Incorrect Access Control vulnerability in SSH server that can result in RCE This attack appear to be exploitable via network connectivity This issue does not affect instances where only the ssh client functionality of the paramiko library is used(CVE-2018-1000805) ...

Github Repositories

Encrypted Credential Management (Python implementation of Credulous)

Credo The python implementation of Credulous (githubcom/realestate-com-au/credulous) Essentially, it's a credential management program written with amazon credentials in mind It uses your ssh key pairs to keep your credentials encrypted on disk until you need to use them Installation Use pip!: pip install credo_manager Usage Import some keys: credo import Ex