CVE-2019-6110

MEDIUM EXPLOITED IN THE WILD RANSOMWARE

OpenSSH 7.9 - Info Disclosure

Title source: llm

Description

In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.

Exploits (2)

exploitdb WORKING POC
by Mark E. Haase · pythonremotemultiple
https://www.exploit-db.com/exploits/46193
exploitdb WORKING POC
pythonremotemultiple
https://www.exploit-db.com/exploits/46516

Scores

CVSS v3 6.8
EPSS 0.5757
EPSS Percentile 98.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

Details

VulnCheck KEV 2020-07-19
InTheWild.io 2022-05-25
Ransomware Use Confirmed
CWE
CWE-838
Status published
Products (7)
netapp/element_software
netapp/ontap_select_deploy
netapp/storage_automation_store
openbsd/openssh < 7.9
siemens/scalance_x204rna_eec_firmware < 3.2.7
siemens/scalance_x204rna_firmware < 3.2.7
winscp/winscp < 5.13
Published Jan 31, 2019
Tracked Since Feb 18, 2026