Vulnerability Details : CVE-2022-38337
When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used.
Vulnerability category: Denial of service
Products affected by CVE-2022-38337
- cpe:2.3:a:mobatek:mobaxterm:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-38337
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-38337
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
3.9
|
5.2
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-04-24 |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2022-38337
-
The product contains hard-coded credentials, such as a password or cryptographic key.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2022-38337
-
https://mobaxterm.mobatek.net/download-home-edition.html
MobaXterm Xserver with SSH, telnet, RDP, VNC and X11 - Home EditionPatch;Release Notes;Vendor Advisory
-
https://docs.ssh-mitm.at/vulnerabilities/CVE-2022-38337.html
CVSS N/A CVE-2022-38337 — SSH-MITMThird Party Advisory
Jump to