CVE-2023-38408

CRITICAL EXPLOITED

OpenSSH <9.3p2 - RCE

Title source: llm

Description

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.

Exploits (11)

nomisec WORKING POC 48 stars
by kali-mx · remote
https://github.com/kali-mx/CVE-2023-38408
nomisec WORKING POC 39 stars
by LucasPDiniz · remote
https://github.com/LucasPDiniz/CVE-2023-38408
nomisec WRITEUP 4 stars
by Adel2411 · poc
https://github.com/Adel2411/cve-2023-38408
nomisec SCANNER 4 stars
by TX-One · client-side
https://github.com/TX-One/CVE-2023-38408
nomisec WORKING POC 2 stars
by classic130 · poc
https://github.com/classic130/CVE-2023-38408
nomisec WORKING POC 1 stars
by mrtacojr · poc
https://github.com/mrtacojr/CVE-2023-38408
nomisec SUSPICIOUS
by nonosticisiguzo-command · poc
https://github.com/nonosticisiguzo-command/nmap-scan-results
nomisec WRITEUP
by jakovtodorovic · poc
https://github.com/jakovtodorovic/openSSH-agent-forwarding-vulnerability-analysis-CVE-2023-38408
nomisec WORKING POC
by xitexploiter96-dot · remote-auth
https://github.com/xitexploiter96-dot/CVE-2023-38408
nomisec STUB
by wxrdnx · poc
https://github.com/wxrdnx/CVE-2023-38408
nomisec SCANNER
by fazilbaig1 · poc
https://github.com/fazilbaig1/cve_2023_38408_scanner

References (20)

Scores

CVSS v3 9.8
EPSS 0.6435
EPSS Percentile 98.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-07-26
CWE
CWE-428
Status published
Products (4)
fedoraproject/fedora 37
fedoraproject/fedora 38
openbsd/openssh 9.3 (2 CPE variants)
openbsd/openssh < 9.3
Published Jul 20, 2023
Tracked Since Feb 18, 2026