Vulnerability Details : CVE-2007-2243
OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.
Products affected by CVE-2007-2243
- cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*
Threat overview for CVE-2007-2243
Top countries where our scanners detected CVE-2007-2243
Top open port discovered on systems with this issue
22
IPs affected by CVE-2007-2243 233,207
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-2243!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-2243
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-2243
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2007-2243
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-2243
-
Red Hat 2007-05-23Not vulnerable. OpenSSH supplied with Red Hat Enterprise Linux 2.1, 3, 4, and 5 does not contain S/KEY support.
References for CVE-2007-2243
-
https://security.netapp.com/advisory/ntap-20191107-0003/
CVE-2007-2243 OpenSSH Vulnerability in NetApp Products | NetApp Product Security
-
http://www.osvdb.org/34600
404 Not Found
-
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html
[Full-Disclosure] Mailing List Charter
-
http://www.securityfocus.com/bid/23601
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/33794
OpenSSH ChallengeResponseAuthentication information disclosure CVE-2007-2243 Vulnerability Report
-
http://securityreason.com/securityalert/2631
OpenSSH - System Account Enumeration if S/Key is used - CXSecurity.com
-
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html
[Full-Disclosure] Mailing List Charter
Jump to