First published: Sat Feb 17 2024(Updated: )
OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Traffix Systems Signaling Delivery Controller | =5.2.0=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000138643 is considered high due to its potential to allow authentication bypass.
To fix F5-K000138643, it is recommended to update the affected F5 Traffix SDC to the latest version that addresses this vulnerability.
F5-K000138643 affects F5 Traffix SDC version 5.2.0 and 5.1.0.
F5-K000138643 exposes systems to row hammer attacks that may lead to authentication bypass.
The root cause of F5-K000138643 is related to the handling of integer values in the mm_answer_authpassword function which can be exploited through bit flips.