CVE-2016-20012

MEDIUM

OpenSSH <8.7 - Info Disclosure

Title source: llm
STIX 2.1

Description

OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product

Exploits (1)

nomisec SCANNER
by arturo-b-cmu · poc
https://github.com/arturo-b-cmu/cve-2016-20012

References (8)

Core 8
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/openssh/openssh-portable/pull/270
Exploit, Third Party Advisory x_refsource_misc
https://rushter.com/blog/public-ssh-keys/
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20211014-0005/
Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
Mailing List, Third Party Advisory x_refsource_misc
https://www.openwall.com/lists/oss-security/2018/08/24/1
Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185

Scores

CVSS v3 5.3
EPSS 0.1460
EPSS Percentile 94.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Details

Status published
Products (5)
netapp/clustered_data_ontap
netapp/hci_management_node
netapp/ontap_select_deploy_administration_utility
netapp/solidfire
openbsd/openssh < 8.7
Published Sep 15, 2021
Tracked Since Feb 18, 2026