CVE-2010-4478

Openbsd Openssh < 5.6 - Authentication Bypass

Title source: rule

Description

OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.

Scores

EPSS 0.0044
EPSS Percentile 62.8%

Classification

CWE
CWE-287
Status draft

Affected Products (50)

openbsd/openssh < 5.6
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
openbsd/openssh
... and 35 more

Timeline

Published Dec 06, 2010
Tracked Since Feb 18, 2026