CVE-2010-4478
Openbsd Openssh < 5.6 - Authentication Bypass
Title source: ruleDescription
OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
References (7)
Scores
EPSS
0.0044
EPSS Percentile
62.8%
Classification
CWE
CWE-287
Status
draft
Affected Products (50)
openbsd/openssh
< 5.6
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
... and 35 more
Timeline
Published
Dec 06, 2010
Tracked Since
Feb 18, 2026