Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-6210

EPSS 90.05% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-6210

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenSSH 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 7.3之前版本中的sshd存在信息泄露漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。未授权的攻击者可利用漏洞获取受影响组件敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-6210

#POC DescriptionSource LinkShenlong Link
1OpenSSH Username Enumeration - CVE-2016-6210https://github.com/justlce/CVE-2016-6210-ExploitPOC Details
2Custom exploit written for enumerating usernames as per CVE-2016-6210https://github.com/goomdan/CVE-2016-6210-exploitPOC Details
3Nonehttps://github.com/samh4cks/CVE-2016-6210-OpenSSH-User-EnumerationPOC Details
4User name enumeration against SSH daemons affected by CVE-2016-6210.https://github.com/coolbabayaga/CVE-2016-6210POC Details
5Nonehttps://github.com/nicoleman0/CVE-2016-6210-OpenSSHd-7.2p2POC Details
6OpenSSH service was detected. https://github.com/projectdiscovery/nuclei-templates/blob/main/network/detection/openssh-detect.yamlPOC Details
7MikroTik RouterOS SSH was detected. https://github.com/projectdiscovery/nuclei-templates/blob/main/network/detection/mikrotik-ssh-detect.yamlPOC Details
8PoC of cve-2016-6210https://github.com/KiPhuong/cve-2016-6210POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-6210

登录查看更多情报信息。

Same Patch Batch · n/a · 2017-02-13 · 120 CVEs total

CVE-2016-9366多款Moxa Nport产品安全漏洞
CVE-2017-5153OSIsoft PI Coresight和PI Web API 信息泄露漏洞
CVE-2017-5152Advantech WebAccess 安全漏洞
CVE-2017-5151VideoInsight Web Client SQL注入漏洞
CVE-2017-5146Carlo Gavazzi Automation VMU-C EM和VMU-C PV 信息泄露漏洞
CVE-2017-5145Carlo Gavazzi Automation VMU-C EM和VMU-C PV 跨站请求伪造漏洞
CVE-2017-5144Carlo Gavazzi Automation VMU-C EM和VMU-C PV 安全漏洞
CVE-2017-5143Honeywell XL Web II Controller 路径遍历漏洞
CVE-2017-5142Honeywell XL Web II Controller 权限许可和访问控制问题漏洞
CVE-2017-5141Honeywell XL Web II Controller 安全漏洞
CVE-2017-5140Honeywell XL Web II Controller 加密问题漏洞
CVE-2017-5139Honeywell XL Web II Controller 信息泄露漏洞
CVE-2016-9371多款Moxa Nport产品跨站脚本漏洞
CVE-2016-9369多款Moxa Nport产品安全漏洞
CVE-2016-9367多款Moxa Nport产品安全漏洞
CVE-2016-9351Advantech SUSIAccess Server 目录遍历漏洞
CVE-2016-9356Moxa DACenter 权限许可和访问控制漏洞
CVE-2016-9354Moxa DACenter 安全漏洞
CVE-2016-9353Advantech SUSIAccess Server 提权漏洞
CVE-2016-9348多款Moxa Nport产品配置错误漏洞

Showing top 20 of 120 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2016-6210

No comments yet


Leave a comment