CVE-2016-6210

MEDIUM

OpenSSH <7.3 - Info Disclosure

Title source: llm

Description

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

Exploits (9)

nomisec WORKING POC 3 stars
by justlce · poc
https://github.com/justlce/CVE-2016-6210-Exploit
nomisec WORKING POC 1 stars
by goomdan · poc
https://github.com/goomdan/CVE-2016-6210-exploit
nomisec WORKING POC 1 stars
by samh4cks · poc
https://github.com/samh4cks/CVE-2016-6210-OpenSSH-User-Enumeration
nomisec WORKING POC
by KiPhuong · poc
https://github.com/KiPhuong/cve-2016-6210
nomisec WORKING POC
by nicoleman0 · poc
https://github.com/nicoleman0/CVE-2016-6210-OpenSSHd-7.2p2
nomisec SCANNER
by coolbabayaga · poc
https://github.com/coolbabayaga/CVE-2016-6210
gitlab WORKING POC
by kar0nt3 · poc
https://gitlab.com/kar0nt3/ssh-users-enumeration-by-cve-2016-6210
exploitdb WORKING POC
by Eddie Harari · textremotelinux
https://www.exploit-db.com/exploits/40113
exploitdb WORKING POC
by 0_o · pythonremotelinux
https://www.exploit-db.com/exploits/40136

Scores

CVSS v3 5.9
EPSS 0.9249
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Classification

CWE
CWE-200
Status published

Affected Products (2)

openbsd/openssh < 7.2
n/a/n/a

Timeline

Published Feb 13, 2017
Tracked Since Feb 18, 2026