Search for vulnerabilities
Vulnerability details: VCID-f1d5-3mz6-aaag
Vulnerability ID VCID-f1d5-3mz6-aaag
Aliases CVE-2018-7749
GHSA-97cv-6pjf-5f9q
PYSEC-2018-108
Summary The SSH server implementation of AsyncSSH before 1.12.1 does not properly check whether authentication is completed before processing other requests. A customized SSH client can simply skip the authentication step.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00341 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.0041 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
epss 0.00784 https://api.first.org/data/v1/epss?cve=CVE-2018-7749
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-97cv-6pjf-5f9q
cvssv3.1 9.8 https://github.com/pypa/advisory-database/tree/main/vulns/asyncssh/PYSEC-2018-108.yaml
generic_textual CRITICAL https://github.com/pypa/advisory-database/tree/main/vulns/asyncssh/PYSEC-2018-108.yaml
cvssv3.1 8.1 https://github.com/ronf/asyncssh
generic_textual HIGH https://github.com/ronf/asyncssh
cvssv3.1 9.8 https://github.com/ronf/asyncssh/commit/16e6ebfa893167c7d9d3f6dc7a2c0d197e47f43a
generic_textual CRITICAL https://github.com/ronf/asyncssh/commit/16e6ebfa893167c7d9d3f6dc7a2c0d197e47f43a
cvssv3.1 9.8 https://github.com/ronf/asyncssh/commit/c161e26cdc0d41b745b63d9f17b437f073bf7ba4
generic_textual CRITICAL https://github.com/ronf/asyncssh/commit/c161e26cdc0d41b745b63d9f17b437f073bf7ba4
cvssv3.1 9.8 https://groups.google.com/forum/#!msg/asyncssh-announce/57_5O7kiHSA/8BXZ_hxHAQAJ
generic_textual CRITICAL https://groups.google.com/forum/#!msg/asyncssh-announce/57_5O7kiHSA/8BXZ_hxHAQAJ
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2018-7749
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2018-7749
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/asyncssh/PYSEC-2018-108.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/ronf/asyncssh
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/ronf/asyncssh/commit/16e6ebfa893167c7d9d3f6dc7a2c0d197e47f43a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/ronf/asyncssh/commit/c161e26cdc0d41b745b63d9f17b437f073bf7ba4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://groups.google.com/forum/#!msg/asyncssh-announce/57_5O7kiHSA/8BXZ_hxHAQAJ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-7749
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-7749
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.71958
EPSS Score 0.00341
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.