First published: Mon Aug 30 2021(Updated: )
An issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jason Alexander phNNTP | <=4.8.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-36370 is classified as medium due to the potential for man-in-the-middle attacks.
To fix CVE-2021-36370, you should update Midnight Commander to a version beyond 4.8.26 that includes proper fingerprint verification.
CVE-2021-36370 exposes users to the risk of connecting to unverified SFTP servers, which could lead to unauthorized access.
CVE-2021-36370 specifically affects versions of Midnight Commander up to and including 4.8.26.
Failing to address CVE-2021-36370 can result in sensitive data being compromised due to unverified connections to potentially malicious servers.