CVE-2019-6110
MEDIUM EXPLOITED IN THE WILD RANSOMWAREOpenSSH 7.9 - Info Disclosure
Title source: llmDescription
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
Exploits (2)
exploitdb
WORKING POC
by Mark E. Haase · pythonremotemultiple
https://www.exploit-db.com/exploits/46193
References (7)
Scores
CVSS v3
6.8
EPSS
0.5757
EPSS Percentile
98.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Details
VulnCheck KEV
2020-07-19
InTheWild.io
2022-05-25
Ransomware Use
Confirmed
CWE
CWE-838
Status
published
Products (7)
netapp/element_software
netapp/ontap_select_deploy
netapp/storage_automation_store
openbsd/openssh
< 7.9
siemens/scalance_x204rna_eec_firmware
< 3.2.7
siemens/scalance_x204rna_firmware
< 3.2.7
winscp/winscp
< 5.13
Published
Jan 31, 2019
Tracked Since
Feb 18, 2026