First published: Mon Jul 18 2016(Updated: )
sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | <=7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6210 is considered a medium severity vulnerability due to the potential for user enumeration attacks.
To fix CVE-2016-6210, upgrade OpenSSH to version 7.3 or later where SHA256 or SHA512 hashing is implemented correctly.
CVE-2016-6210 affects OpenSSH versions prior to 7.3, particularly version 7.2 and earlier.
Yes, CVE-2016-6210 can lead to a security breach as it allows remote attackers to enumerate valid usernames.
Mitigations for CVE-2016-6210 include employing additional controls such as account lockouts and using different hashing algorithms.