5
CVSSv2

CVE-2021-36370

Published: 30/08/2021 Updated: 08/09/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

An issue exists in Midnight Commander up to and including 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

midnight-commander midnight commander

Vendor Advisories

Debian Bug report logs - #993404 mc: CVE-2021-36370 Package: src:mc; Maintainer for src:mc is Dmitry Smirnov <onlyjob@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 31 Aug 2021 19:45:01 UTC Severity: important Tags: security, upstream Found in versions mc/3:4822-1, mc/3:4826-11 ...
An issue was discovered in Midnight Commander through 4826 When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed As a result, a user connects to the server without the ability to verify its authenticity (CVE-2021-36370) ...
An issue was discovered in Midnight Commander through 4826 When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed As a result, a user connects to the server without the ability to verify its authenticity ...