First published: Sun Dec 24 2023(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Traffix Systems Signaling Delivery Controller | =5.2.0=5.1.0 | |
debian/openssh | <=1:8.4p1-5+deb11u3<=1:8.4p1-5+deb11u4<=1:9.2p1-2+deb12u4<=1:9.2p1-2+deb12u5<=1:9.9p1-3<=1:9.9p2-1 | |
OpenSSH | ||
Fedora | =39 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51767 is considered to have a moderate severity due to the potential for authentication bypass via row hammer attacks.
To mitigate CVE-2023-51767, upgrade OpenSSH to a version later than 9.6 that addresses this vulnerability.
CVE-2023-51767 affects OpenSSH versions up to and including 9.6, as well as specific versions of F5 Traffix SDC.
Yes, CVE-2023-51767 may allow an attacker to bypass authentication under certain conditions due to a flaw in the authentication process.
Row hammer attacks exploit bit flips in DRAM to manipulate data, potentially allowing unauthorized access in the context of CVE-2023-51767.