CVE-2023-38408
CRITICAL EXPLOITEDOpenSSH <9.3p2 - RCE
Title source: llmDescription
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
Exploits (11)
nomisec
SUSPICIOUS
by nonosticisiguzo-command · poc
https://github.com/nonosticisiguzo-command/nmap-scan-results
nomisec
WRITEUP
by jakovtodorovic · poc
https://github.com/jakovtodorovic/openSSH-agent-forwarding-vulnerability-analysis-CVE-2023-38408
nomisec
WORKING POC
by xitexploiter96-dot · remote-auth
https://github.com/xitexploiter96-dot/CVE-2023-38408
References (20)
Scores
CVSS v3
9.8
EPSS
0.6435
EPSS Percentile
98.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-07-26
CWE
CWE-428
Status
published
Products (4)
fedoraproject/fedora
37
fedoraproject/fedora
38
openbsd/openssh
9.3 (2 CPE variants)
openbsd/openssh
< 9.3
Published
Jul 20, 2023
Tracked Since
Feb 18, 2026