Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15473

EPSS 90.36% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-15473

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenSSH 竞争条件问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenSSH(OpenBSD Secure Shell)是OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 7.7及之前版本中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2018-15473

#POC DescriptionSource LinkShenlong Link
1OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).https://github.com/trimstray/massh-enumPOC Details
2CVE-2018-15473 - Opensshenum is an user enumerator exploiting an OpenSsh bughttps://github.com/gbonacini/opensshenumPOC Details
3Exploit written in Python for CVE-2018-15473 with threading and export formatshttps://github.com/Rhynorater/CVE-2018-15473-ExploitPOC Details
4Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473https://github.com/epi052/cve-2018-15473POC Details
5OpenSSH < 7.7 User Enumeration CVE-2018-15473 Exploithttps://github.com/pyperanger/CVE-2018-15473_exploitPOC Details
6OpenSSH 7.7 - Username Enumerationhttps://github.com/r3dxpl0it/CVE-2018-15473POC Details
7Fully functional script for brute forcing SSH and trying credentials - CVE-2018-15473https://github.com/JoeBlackSecurity/SSHUsernameBruter-SSHUBPOC Details
8cve-2018-15473https://github.com/cved-sources/cve-2018-15473POC Details
9This is a exp of CVE-2018-15473https://github.com/LINYIKAI/CVE-2018-15473-expPOC Details
10OpenSSH 用户名枚举漏洞(CVE-2018-15473)https://github.com/trickster1103/-POC Details
11SSH account enumeration verification script(CVE-2018-15473)https://github.com/NHPT/SSH-account-enumeration-verification-scriptPOC Details
12CVE-2018-15473-Exploithttps://github.com/CaioCGH/EP4-redesPOC Details
13Project with sublist3r, massan, CVE-2018-15473, ssh bruteforce, ftp bruteforce and nikto.https://github.com/Moon1705/easy_securityPOC Details
14Checks a list of SSH servers for password-based auth availability and for the existence of SSH user enumeration vulnerability (CVE-2018-15473) in those identified.https://github.com/An0nYm0u5101/enumpossiblePOC Details
15Nonehttps://github.com/Wh1t3Fox/cve-2018-15473POC Details
16Nonehttps://github.com/1stPeak/CVE-2018-15473POC Details
17openssh<7.7 用户名枚举https://github.com/coollce/CVE-2018-15473_burtePOC Details
18Nonehttps://github.com/Dirty-Racoon/CVE-2018-15473-py3POC Details
19OpenSSH 2.3 < 7.7 - Username Enumerationhttps://github.com/Sait-Nuri/CVE-2018-15473POC Details
20Nonehttps://github.com/WildfootW/CVE-2018-15473_OpenSSH_7.7POC Details
21CVE-2018-15473 Exploithttps://github.com/MrDottt/CVE-2018-15473POC Details
22Test CVE-2018-15473 exploit on Shodan IPhttps://github.com/66quentin/shodan-CVE-2018-15473POC Details
23Nonehttps://github.com/0xrobiul/CVE-2018-15473POC Details
24Nonehttps://github.com/philippedixon/CVE-2018-15473POC Details
25SSH User Enumerator in Python3, CVE-2018-15473, I updated the code of this exploit (https://www.exploit-db.com/exploits/45939) to work with python3 instead of python2.https://github.com/sergiovks/SSH-User-Enum-Python3-CVE-2018-15473POC Details
26Nonehttps://github.com/Anonimo501/ssh_enum_users_CVE-2018-15473POC Details
27Nonehttps://github.com/mclbn/docker-cve-2018-15473POC Details
28User enumeration for CVE-2018-15473https://github.com/GaboLC98/userenum-CVE-2018-15473POC Details
29SSH Username Enumeration https://github.com/mrblue12-byte/CVE-2018-15473POC Details
30Nonehttps://github.com/4xolotl/CVE-2018-15473POC Details
31Nonehttps://github.com/NestyF/SSH_Enum_CVE-2018-15473POC Details
32Fix for CVE-2018-15473https://github.com/yZ1337/CVE-2018-15473POC Details
33Nonehttps://github.com/MahdiOsman/CVE-2018-15473-SNMPv1-2-Community-String-Vulnerability-TestingPOC Details
34FAFAFhttps://github.com/SUDORM0X/PoC-CVE-2018-15473POC Details
35SSHEnum es una herramienta de enumeración de usuarios SSH basada en CVE-2018-15473. Permite detectar usuarios válidos aprovechando respuestas diferenciadas del servidor. Es rápida, compatible con Python 3.12 y soporta wordlists. Uso exclusivo para auditoría y pruebas de seguridad autorizadas.https://github.com/OmarV4066/SSHEnumKLPOC Details
36A Bash script to enumerate valid SSH usernames using the CVE-2018-15473 vulnerability. It checks for valid usernames on an OpenSSH OpenSSH 7.2p2 server by analyzing authentication responses.https://github.com/0xNehru/ssh_Enum_vaildPOC Details
37Check if a username is valid on the SSH server by attempting an authentication. The server response will indicate whether the username exists.https://github.com/moften/cve-2018-15473-pocPOC Details
38Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/OpenSSH%20%E7%94%A8%E6%88%B7%E5%90%8D%E6%9E%9A%E4%B8%BE%E6%BC%8F%E6%B4%9E%20CVE-2018-15473.mdPOC Details
39https://github.com/vulhub/vulhub/blob/master/openssh/CVE-2018-15473/README.mdPOC Details
40Fix for CVE-2018-15473https://github.com/yZeetje/CVE-2018-15473POC Details
41This script checks for the OpenSSH 7.7 (and prior) username enumeration vulnerability (CVE-2018-15473). It sends a malformed authentication packet and interprets the SSH server’s response to identify valid usernames.https://github.com/makmour/open-ssh-user-enumerationPOC Details
42Fix for CVE-2018-15473https://github.com/yZee00/CVE-2018-15473POC Details
43script de enumeración de usuarios SSH basado en diferencias de timing y respuestas de autenticación. Explota el mismo vector que CVE-2018-15473 en versiones vulnerables de OpenSSH (≤ 7.7), aunque también puede revelar patrones en configuraciones modernas.https://github.com/Alph4Sec/ssh_enum_pyPOC Details
44Advanced network penetration testing toolkit with SSH vulnerability assessment, CVE-2018-15473 exploitation, stealth brute force capabilities, and fail2ban evasion techniques. Professional-grade security testing framework for authorized penetration testing engagements.https://github.com/anonymous121029034720384234234/py-network-scannerPOC Details
45Exploit Code for CVE-2018-15473https://github.com/jubeenshah/CVE-2018-15473-ExploitPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-15473

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-08-17 · 11 CVEs total

CVE-2018-15468Xen 安全漏洞
CVE-2018-15469Xen 安全漏洞
CVE-2018-15470Xen 安全漏洞
CVE-2018-15471Linux kernel 缓冲区错误漏洞
CVE-2018-14057Pimcore 跨站请求伪造漏洞
CVE-2018-14058Pimcore SQL注入漏洞
CVE-2018-6622Trusted Platform Module 安全漏洞
CVE-2018-14981Android 访问控制错误漏洞
CVE-2018-14982Android GNSS application 访问控制错误漏洞
CVE-2018-15482Android 访问控制错误漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2018-15473

No comments yet


Leave a comment