First published: Wed Aug 15 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssh | <=1:6.7p1-1<=1:7.7p1-1 | 1:7.7p1-4 1:7.4p1-10+deb9u4 |
IBM Security Identity Manager | <=7.0.1 | |
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u3 1:9.9p1-1 | |
OpenSSH | <=7.7 | |
Debian | =8.0 | |
Debian | =9.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
All of | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
NetApp FAS/AFF Baseboard Management Controller | ||
netapp cloud backup | ||
NetApp Data ONTAP Edge | ||
NetApp FAS/AFF Baseboard Management Controller | ||
NetApp OnCommand Unified Manager for vSphere | >=9.4 | |
NetApp ONTAP Select Deploy Utility | ||
NetApp Service Processor | ||
NetApp SteelStore | ||
NetApp Virtual Storage Console for VMware vSphere | >=7.2 | |
NetApp Clustered Data ONTAP | ||
NetApp Data ONTAP 7-Mode | ||
All of | ||
NetApp VASA Provider | >=7.2 | |
NetApp Clustered Data ONTAP | ||
All of | ||
NetApp Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere | >=7.2 | |
NetApp Clustered Data ONTAP | ||
Oracle Sun ZFS Storage Appliance Kit software | =8.8.6 | |
All of | ||
Siemens Scalance X204RNA EEC Firmware | <3.2.7 | |
Siemens Scalance X204RNA EEC | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
NetApp VASA Provider | >=7.2 | |
NetApp Clustered Data ONTAP | ||
NetApp Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere | >=7.2 | |
Siemens Scalance X204RNA EEC Firmware | <3.2.7 | |
Siemens Scalance X204RNA EEC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15473 is a user enumeration vulnerability in OpenSSH through 7.7.
CVE-2018-15473 has a severity score of 5.3, which is considered high.
OpenSSH versions up to and including 7.7 are affected by CVE-2018-15473.
To fix CVE-2018-15473, update OpenSSH to version 7.7 or higher.
More information about CVE-2018-15473 can be found at the following references: [link1](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473), [link2](http://www.openwall.com/lists/oss-security/2018/08/15/5), [link3](https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0).