CVE-2016-6210

MEDIUM

OpenSSH <7.3 - Info Disclosure

Title source: llm
STIX 2.1

Description

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

Exploits (11)

exploitdb WORKING POC
by 0_o · pythonremotelinux
https://www.exploit-db.com/exploits/40136
exploitdb WORKING POC
by Eddie Harari · textremotelinux
https://www.exploit-db.com/exploits/40113
nomisec WORKING POC 3 stars
by justlce · poc
https://github.com/justlce/CVE-2016-6210-Exploit
nomisec SCANNER 1 stars
by wabiyagi · poc
https://github.com/wabiyagi/CVE-2016-6210
nomisec WORKING POC 1 stars
by goomdan · poc
https://github.com/goomdan/CVE-2016-6210-exploit
nomisec WORKING POC 1 stars
by samh4cks · poc
https://github.com/samh4cks/CVE-2016-6210-OpenSSH-User-Enumeration
gitlab WORKING POC
by kar0nt3 · poc
https://gitlab.com/kar0nt3/ssh-users-enumeration-by-cve-2016-6210
nomisec WORKING POC
by KiPhuong · poc
https://github.com/KiPhuong/cve-2016-6210
nomisec WORKING POC
by nicoleman0 · poc
https://github.com/nicoleman0/CVE-2016-6210-OpenSSHd-7.2p2
nomisec SCANNER
by coolbabayaga · poc
https://github.com/coolbabayaga/CVE-2016-6210

References (12)

Core 12
Core References
Vendor Advisory vendor-advisory
https://access.redhat.com/errata/RHSA-2017:2563
Third Party Advisory, VDB Entry vdb-entry
http://www.securitytracker.com/id/1036319
Mailing List, Third Party Advisory mailing-list
http://seclists.org/fulldisclosure/2016/Jul/51
Third Party Advisory vendor-advisory
http://www.debian.org/security/2016/dsa-3626
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/40136/
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/40113/
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/201612-18
Vendor Advisory vendor-advisory
https://access.redhat.com/errata/RHSA-2017:2029
Third Party Advisory, VDB Entry vdb-entry
http://www.securityfocus.com/bid/91812
Release Notes, Vendor Advisory
https://www.openssh.com/txt/release-7.3

Scores

CVSS v3 5.9
EPSS 0.9005
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-200
Status published
Products (1)
openbsd/openssh < 7.2
Published Feb 13, 2017
Tracked Since Feb 18, 2026