NA

CVE-2021-36369

Published: 12/10/2022 Updated: 20/01/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An issue exists in Dropbear up to and including 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an malicious user to abuse a forwarded agent for logging on to another server unnoticed.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dropbear ssh project dropbear ssh

debian debian linux 10.0

Github Repositories

Findings regarding controlling a Unifi USP-PDU-PRO via SSH

USP-PDU-Pro-SSH-Control Findings regarding controlling a Unifi USP-PDU-PRO via SSH Summary You can control the USP-PDU-Pro from SSH and probably disconnect it entirely from reporting back to the Unifi controller This is a work in progress Make sure that you put the scripts in /etc/persistent or they will be deleted when the unit reboots I have collected a number of data shee

linux related informations about RevoPoint Pop2

revopoint-pop2-linux-info linux related informations about RevoPoint Pop 2 I'm one of the backers of the RevoPoint Pop 2 kickstarter campain and asked for Linux support directly after backing (the reply sounded like "We might look into it when the windows release is more stable") Of course I still hope this will happen officially one day, but I have the device si