CVE-2015-1832

Vulnerability updated 4 months ago (2024-05-04T18:28:55.609Z)
Download STIX
Preview STIX
CVE-2015-1832 is a vulnerability that affects the OpenSSH server between versions 5.4 and 7.1. This flaw allowed remote attackers to bypass authentication by presenting a crafted SSH key. The vulnerability was caused by a coding error during the processing of the public key authentication request, which would lead to the acceptance of any valid signature. In April 2015, OpenSSH released a patch to address CVE-2015-1832 in versions 7.1p1 and 6.9p1. This vulnerability was assigned a CVSS score of 6.8 out of 10, indicating a significant impact on confidentiality, integrity, and availability. Making matters worse, it was disclosed that this flaw had been present in OpenSSH for over six years, leaving countless systems vulnerable. The consequences of a successful exploit of this vulnerability could have been severe. Attackers with access to public keys associated with an OpenSSH server could gain full control over the affected system, allowing them to steal sensitive data, install malware, or carry out further attacks. Organizations were urged to promptly update their OpenSSH servers to the patched versions to mitigate the risk of this vulnerability being exploited.
Description last updated: 2023-06-27T10:51:18.564Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2015-1832 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
a year ago
Multiple vulnerabilities in IBM App Connect Enterprise Toolkit and the IBM Integration Bus Toolkit