CVE-2016-6210
MEDIUMOpenSSH <7.3 - Info Disclosure
Title source: llmDescription
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
Exploits (9)
nomisec
WORKING POC
1 stars
by samh4cks · poc
https://github.com/samh4cks/CVE-2016-6210-OpenSSH-User-Enumeration
gitlab
WORKING POC
by kar0nt3 · poc
https://gitlab.com/kar0nt3/ssh-users-enumeration-by-cve-2016-6210
References (12)
Scores
CVSS v3
5.9
EPSS
0.9249
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Classification
CWE
CWE-200
Status
published
Affected Products (2)
openbsd/openssh
< 7.2
n/a/n/a
Timeline
Published
Feb 13, 2017
Tracked Since
Feb 18, 2026