CVE-2023-51767
ADVISORY - nistSummary
OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
EPSS Score: 0.00011 (0.010)
Common Weakness Enumeration (CWE)
ADVISORY - nist
ADVISORY - redhat
Improper Authentication
NIST
CREATED
UPDATED
ADVISORY IDCVE-2023-51767
EXPLOITABILITY SCORE
1
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
7highDebian
CREATED
UPDATED
ADVISORY IDCVE-2023-51767
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
N/AlowUbuntu
CREATED
UPDATED
ADVISORY IDCVE-2023-51767
EXPLOITABILITY SCORE
1.0
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
7mediumRed Hat
CREATED
UPDATED
ADVISORY IDCVE-2023-51767
EXPLOITABILITY SCORE
1.0
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
7mediumChainguard
CREATED
UPDATED
ADVISORY ID
CGA-48mc-52qc-4c82
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-